Suppression List - Protection and Tracking

Protection and Tracking

A variety of technological means are used to protect suppression lists and track suppression list abuse. These include neutral third party scrubbing of email lists, distribution of MD5 secure hash suppression lists and distribution of "seeded" email lists.

The best practice in distributing these lists is to avoid sending the email addresses themselves as plaintext, but instead send a list with one "hash" per line, each hash generated from an email address using a one-way cryptographic hash function.

Internal mailing lists can be scrubbed by using the same hash function to generate one "hash" for each email address on internal mailing lists, and if the internally generated hash matches any of the hashes on the suppression list, then the corresponding email address on the internal mailing list *should* be removed.

Because the hash is one-way, it's not possible for a person to recover the original email address if that person only has the code, making it impossible for that email address to accidentally or deliberately be *added* (rather than removed) from internal mailing lists.

Read more about this topic:  Suppression List

Famous quotes containing the words protection and/or tracking:

    Guns have metamorphosed into cameras in this earnest comedy, the ecology safari, because nature has ceased to be what it always had been—what people needed protection from. Now nature tamed, endangered, mortal—needs to be protected from people.
    Susan Sontag (b. 1933)

    Such is the art of writing as Dreiser understands it and practices it—an endless piling up of minutiae, an almost ferocious tracking down of ions, electrons and molecules, an unshakable determination to tell it all. One is amazed by the mole-like diligence of the man, and no less by his exasperating disregard for the ease of his readers.
    —H.L. (Henry Lewis)