473,698 Members | 2,588 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Pls point me in the right direction - hide e-mail address

Greetings
I am not looking for a spambot killer or an obfuscator, what I need
is something that will achieve the following. Coulr someone pls point
me at a suitable script.
I run a site which, in part, allows a runaway child or their parents to
communicate with each other by messages, I would like them to be
able to do this by e-mail however, neither side, and particularily the
child side should have their e-mail address divulged.
What I need is basically a simple form with a text box and a 'Send Message'
button that, in the background in fact sends an e-mail without anyone being
able to see where the e-mail is actually going to, neither in the status bar
or by viewing the source.
Is this possible in JS or am I better to have all the e-mails directed to us
and
we re-send them on. Surely something like this though can be automated.
Similiar, I guess, to how it is done on the 'dating' websites.
Any pointers gratefully received.

Webmaster
http://www.kidwatch-uk.net
Jul 20 '05 #1
2 1990
Sure it's possible. Not using Javascript though, you'll need a server-side
scripting language like ASP, PHP, etc.

You could email me with the URL to your form and I'll help you out.

Doesn't Matter, on Wed, 05 Nov 2003 19:11:53 +0000, had to say:
Greetings
I am not looking for a spambot killer or an obfuscator, what I need
is something that will achieve the following. Coulr someone pls point
me at a suitable script.
I run a site which, in part, allows a runaway child or their parents to
communicate with each other by messages, I would like them to be
able to do this by e-mail however, neither side, and particularily the
child side should have their e-mail address divulged.
What I need is basically a simple form with a text box and a 'Send Message'
button that, in the background in fact sends an e-mail without anyone being
able to see where the e-mail is actually going to, neither in the status bar
or by viewing the source.
Is this possible in JS or am I better to have all the e-mails directed to us
and
we re-send them on. Surely something like this though can be automated.
Similiar, I guess, to how it is done on the 'dating' websites.
Any pointers gratefully received.

Webmaster
http://www.kidwatch-uk.net


Jul 20 '05 #2
JRS: In article <Hz************ ********@newsfe p1-win.server.ntli .net>,
seen in news:comp.lang. javascript, Doesn't Matter
<pi************ *@aol.com> posted at Wed, 5 Nov 2003 19:11:53 :-
I am not looking for a spambot killer or an obfuscator, what I need
is something that will achieve the following. Coulr someone pls point
me at a suitable script.
I run a site which, in part, allows a runaway child or their parents to
communicate with each other by messages, I would like them to be
able to do this by e-mail however, neither side, and particularily the
child side should have their e-mail address divulged.
What I need is basically a simple form with a text box and a 'Send Message'
button that, in the background in fact sends an e-mail without anyone being
able to see where the e-mail is actually going to, neither in the status bar
or by viewing the source.
Is this possible in JS or am I better to have all the e-mails directed to us
and
we re-send them on. Surely something like this though can be automated.
Similiar, I guess, to how it is done on the 'dating' websites.
Any pointers gratefully received.


You need this to be absolutely trustworthy, for any client computer
system; you cannot, for example, assume Microsoft browser and mail, and
you cannot assume the absence of extensive logging of interconnection
data, and you cannot assume that the present situation will remain
unchanged.

There is no way in which you can be sure of achieving this if mail, or
any other communication, is sent directly from one to the other.

The only way is to use at least one trusted intermediate agent; this
agent needs to be trustworthy both morally and technically.

It may be wise to use more than one intermediate, so that one system
knows that ki*@hostel.uk is Juvenile XYZ2345, and another knows that
JXYZ2345 intercommunicat es with P1765ABC, and another knows that Parent
1765ABC is da*@jail.bc. If a single machine is compromised, then the
security is not fully broken. Possibly there should be an intermediate
link which does not use the Internet at all.

For the case where kid is indeed @hostel and not at an arbitrary
location, then you *may* know more about the physical security of kid's
machine; OTOH, kid's machine is a more obvious target of attack for
those you would specifically wish to defend against. Similarly for the
other end.

If you need to ask, then obviously you do not have the knowledge / skill
/ understanding needed to implement the latter, and you should entrust
the technicalities to appropriate professional Internet programmers,
with an independent skilled check on their work. This is no job for the
bungling amateur.

Remember, the intruder may easily be smarter than you are.

You must allow for the possibility that the identity of the system that
kid/dad communicates with will be discovered, by which I mean the name
of the entity they send to or receive from. This name will obviously
have to be discoverable by possible customers; but it can of itself be a
moderately neutral name, and perhaps slightly deceptive. Then the kid,
or the dad, need not be too concerned about, for example, routine
communications logging.

Remember also that the kid, or even the dad, may be smarter than you
are.

Neither client should possess a unique identifier for the partner; he
should use in effect a suffix, perhaps represented by a codeword such as
Son or Dtr2. Otherwise, there would be a risk that dad1@jail might see
that dad2@jail was claiming paternity of the same lad as he was.

Now consult an expert.

--
© John Stockton, Surrey, UK. ?@merlyn.demon. co.uk Turnpike v4.00 MIME. ©
Web <URL:http://www.merlyn.demo n.co.uk/> - FAQish topics, acronyms, & links.
Proper <= 4-line sig. separator as above, a line exactly "-- " (SonOfRFC1036)
Do not Mail News to me. Before a reply, quote with ">" or "> " (SonOfRFC1036)
Jul 20 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
1463
by: MooMaster | last post by:
I'm a complete beginner in Python, but I've been fooling around with Java for a couple years, so I have decent programming experience... Anyway, I was sitting around playing with Python, when I thought to myself: "I know! I'd like to write a program that I can pass a path to (say: My Pictures) and at a timer interval will pick a picture from it and set my wallpaper to that" So I started reading about os, threads, and the path for the...
1
1509
by: A. Name | last post by:
Can someone please point me in the right direction? This is what I want to accomplish. The page has a simple form for input on it. When a user enters in information and clicks the button, the current list of items is displayed. So, if the page looks like this: ----------------- | tweeking | Add
4
329
by: John Osborne | last post by:
I'm a beginner at this programming thing (C# and VB/VB.Net) but I have been given a task that I don't even knwo how to start to accomplish. I'm not asking anyone to write the code or anything, just to point me in the right direction if you can. The situation is this... My boss wants me to write a client that users can use to connect to a machine on our network (we'll call this the host) and view the host's screen as close to real time...
3
1677
by: Jheitmuller | last post by:
Hi, I would like to convert a VB.NET application from being a Windows app to an ASP.NET app. I'm new to web development, so this may be a simple question. Is it possible to render simple drawing commands in an ASP.NET application? Something line draw a line point to point, or draw a circle at this point. If so, can somebody point me toward the library or technique to use? I can figure it out if I can get pointed in the right...
4
1265
by: Steve Y. | last post by:
Hi, I need some input to help my thinking process. We have a multi layer web application now but we didn't do a very good job separating the business logic from the user interface logic. So as you can imagine as it is getting bigger it is harder to maintain. We would really like to pull the business logic into class objects but I am stuck on the concept. Today the web front end reacts to events and makes web service calls. The web...
5
2222
by: AManAfterGod | last post by:
OK, I'm fairly new to Java and I wanted to try if I could convert an easy Microsoft Excel problem into Java but I've hit a road block. I was wondering if one of you could point me in the right direction. I'm trying to write that would double pay everyday for 35 numbers and show the output as... You were paid $.01 on Day 1. Your total salary is $.01 You were paid $.02 on Day 2. Your total salary is $.03 You were paid $.04 on Day 3. Your...
2
1327
by: =?Utf-8?B?cm9kY2hhcg==?= | last post by:
hey all, i have an excel file that contains employee information. inside the workbook there are numerous worksheets - one per employee. is it possible to iterate thru the workbook reading pieces of data by any chance? can somone please point me in the right direction? thanks, rodchar
137
6663
by: mathieu.dutour | last post by:
Dear all, I want to do multiprecision floating point, i.e. I want to go beyond single precision, double precision and have quadruple precision, octuple precision and the like, and possibly with high speed. What would be the possible alternatives? Thanks for any help
3
1915
by: pjmulla | last post by:
I am nes to python and need some help. Can anyone lead me in the right direction to create and print a Point object, and then use id to print the object's unique identifier. Translate the hexadecimal form into decimal and confirm that they match. Any help woul be much appreciated. Pete
6
2262
by: chloejacobs | last post by:
Hi every1! My first post on Bytes :) I want to create a simple web page that will read of CSV file, sort the file by certain fields, take out duplicate entries if 3 fields have the same value and then write the amended csv file to a XLS file? Is this possible and could you please point me in the right direction? Kind Regards, Chloe ~X~
0
8609
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9169
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8899
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8871
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7738
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6528
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4371
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4622
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
2335
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.