473,398 Members | 2,368 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,398 software developers and data experts.

Pls point me in the right direction - hide e-mail address

Greetings
I am not looking for a spambot killer or an obfuscator, what I need
is something that will achieve the following. Coulr someone pls point
me at a suitable script.
I run a site which, in part, allows a runaway child or their parents to
communicate with each other by messages, I would like them to be
able to do this by e-mail however, neither side, and particularily the
child side should have their e-mail address divulged.
What I need is basically a simple form with a text box and a 'Send Message'
button that, in the background in fact sends an e-mail without anyone being
able to see where the e-mail is actually going to, neither in the status bar
or by viewing the source.
Is this possible in JS or am I better to have all the e-mails directed to us
and
we re-send them on. Surely something like this though can be automated.
Similiar, I guess, to how it is done on the 'dating' websites.
Any pointers gratefully received.

Webmaster
http://www.kidwatch-uk.net
Jul 20 '05 #1
2 1969
Sure it's possible. Not using Javascript though, you'll need a server-side
scripting language like ASP, PHP, etc.

You could email me with the URL to your form and I'll help you out.

Doesn't Matter, on Wed, 05 Nov 2003 19:11:53 +0000, had to say:
Greetings
I am not looking for a spambot killer or an obfuscator, what I need
is something that will achieve the following. Coulr someone pls point
me at a suitable script.
I run a site which, in part, allows a runaway child or their parents to
communicate with each other by messages, I would like them to be
able to do this by e-mail however, neither side, and particularily the
child side should have their e-mail address divulged.
What I need is basically a simple form with a text box and a 'Send Message'
button that, in the background in fact sends an e-mail without anyone being
able to see where the e-mail is actually going to, neither in the status bar
or by viewing the source.
Is this possible in JS or am I better to have all the e-mails directed to us
and
we re-send them on. Surely something like this though can be automated.
Similiar, I guess, to how it is done on the 'dating' websites.
Any pointers gratefully received.

Webmaster
http://www.kidwatch-uk.net


Jul 20 '05 #2
JRS: In article <Hz********************@newsfep1-win.server.ntli.net>,
seen in news:comp.lang.javascript, Doesn't Matter
<pi*************@aol.com> posted at Wed, 5 Nov 2003 19:11:53 :-
I am not looking for a spambot killer or an obfuscator, what I need
is something that will achieve the following. Coulr someone pls point
me at a suitable script.
I run a site which, in part, allows a runaway child or their parents to
communicate with each other by messages, I would like them to be
able to do this by e-mail however, neither side, and particularily the
child side should have their e-mail address divulged.
What I need is basically a simple form with a text box and a 'Send Message'
button that, in the background in fact sends an e-mail without anyone being
able to see where the e-mail is actually going to, neither in the status bar
or by viewing the source.
Is this possible in JS or am I better to have all the e-mails directed to us
and
we re-send them on. Surely something like this though can be automated.
Similiar, I guess, to how it is done on the 'dating' websites.
Any pointers gratefully received.


You need this to be absolutely trustworthy, for any client computer
system; you cannot, for example, assume Microsoft browser and mail, and
you cannot assume the absence of extensive logging of interconnection
data, and you cannot assume that the present situation will remain
unchanged.

There is no way in which you can be sure of achieving this if mail, or
any other communication, is sent directly from one to the other.

The only way is to use at least one trusted intermediate agent; this
agent needs to be trustworthy both morally and technically.

It may be wise to use more than one intermediate, so that one system
knows that ki*@hostel.uk is Juvenile XYZ2345, and another knows that
JXYZ2345 intercommunicates with P1765ABC, and another knows that Parent
1765ABC is da*@jail.bc. If a single machine is compromised, then the
security is not fully broken. Possibly there should be an intermediate
link which does not use the Internet at all.

For the case where kid is indeed @hostel and not at an arbitrary
location, then you *may* know more about the physical security of kid's
machine; OTOH, kid's machine is a more obvious target of attack for
those you would specifically wish to defend against. Similarly for the
other end.

If you need to ask, then obviously you do not have the knowledge / skill
/ understanding needed to implement the latter, and you should entrust
the technicalities to appropriate professional Internet programmers,
with an independent skilled check on their work. This is no job for the
bungling amateur.

Remember, the intruder may easily be smarter than you are.

You must allow for the possibility that the identity of the system that
kid/dad communicates with will be discovered, by which I mean the name
of the entity they send to or receive from. This name will obviously
have to be discoverable by possible customers; but it can of itself be a
moderately neutral name, and perhaps slightly deceptive. Then the kid,
or the dad, need not be too concerned about, for example, routine
communications logging.

Remember also that the kid, or even the dad, may be smarter than you
are.

Neither client should possess a unique identifier for the partner; he
should use in effect a suffix, perhaps represented by a codeword such as
Son or Dtr2. Otherwise, there would be a risk that dad1@jail might see
that dad2@jail was claiming paternity of the same lad as he was.

Now consult an expert.

--
© John Stockton, Surrey, UK. ?@merlyn.demon.co.uk Turnpike v4.00 MIME. ©
Web <URL:http://www.merlyn.demon.co.uk/> - FAQish topics, acronyms, & links.
Proper <= 4-line sig. separator as above, a line exactly "-- " (SonOfRFC1036)
Do not Mail News to me. Before a reply, quote with ">" or "> " (SonOfRFC1036)
Jul 20 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: MooMaster | last post by:
I'm a complete beginner in Python, but I've been fooling around with Java for a couple years, so I have decent programming experience... Anyway, I was sitting around playing with Python, when I...
1
by: A. Name | last post by:
Can someone please point me in the right direction? This is what I want to accomplish. The page has a simple form for input on it. When a user enters in information and clicks the button, the...
4
by: John Osborne | last post by:
I'm a beginner at this programming thing (C# and VB/VB.Net) but I have been given a task that I don't even knwo how to start to accomplish. I'm not asking anyone to write the code or anything,...
3
by: Jheitmuller | last post by:
Hi, I would like to convert a VB.NET application from being a Windows app to an ASP.NET app. I'm new to web development, so this may be a simple question. Is it possible to render simple drawing...
4
by: Steve Y. | last post by:
Hi, I need some input to help my thinking process. We have a multi layer web application now but we didn't do a very good job separating the business logic from the user interface logic. So as...
5
by: AManAfterGod | last post by:
OK, I'm fairly new to Java and I wanted to try if I could convert an easy Microsoft Excel problem into Java but I've hit a road block. I was wondering if one of you could point me in the right...
2
by: =?Utf-8?B?cm9kY2hhcg==?= | last post by:
hey all, i have an excel file that contains employee information. inside the workbook there are numerous worksheets - one per employee. is it possible to iterate thru the workbook reading pieces...
137
by: mathieu.dutour | last post by:
Dear all, I want to do multiprecision floating point, i.e. I want to go beyond single precision, double precision and have quadruple precision, octuple precision and the like, and possibly with...
3
by: pjmulla | last post by:
I am nes to python and need some help. Can anyone lead me in the right direction to create and print a Point object, and then use id to print the object's unique identifier. Translate the...
6
by: chloejacobs | last post by:
Hi every1! My first post on Bytes :) I want to create a simple web page that will read of CSV file, sort the file by certain fields, take out duplicate entries if 3 fields have the same value...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.