Blue Frog

Blue Frog was standing under the MPL Mozilla Public License spam filter.

To subscribe to the whitelist and blacklist, a registration was required. Blue Frog integrated into Outlook, Outlook Express, Thunderbird and Firefox. Reports of spam sent over an encrypted connection with OpenSSL on Blue Security and stored centrally.

Blue Frog thus stood out from other spam filters that was active action against spammers. This worked as follows: The user sent his spam about him a specially assigned e- mail address to Bluesecurity.com. This is sent spam was analyzed by specialists and a corresponding complaint script for the page to the advertised program. Once this was available, the Blue Frog client of the affected users were using this script to send a complaint to the page. Blue Security stayed there that actually only one complaint to the page in question was sent into consummate per spam e -mail.

Beginning on May 1, 2006, the website of the program was attacked by DDoS attacks. Email employees were threatened and widespread misinformation about the Blue Frog program. Then Blue Security was on 16 May 2006 known discontinue the Service.

Under the name Okopipi Shortly thereafter was a new independent project in the works, which should implement the Blue Frog principle P2P-based. DDoS attacks on a distributed structure are at least difficult, in all likelihood futile. Would the development succeeded, which would have the profitability of spam Things inflicted damage sensitive. In the meantime, however, the work on Okopipi has been set. With the words "the little frog is dead, long live to spam! " stated one of the initiators of Okopipi the unwillingness of volunteers to support the project.

Pictures of Blue Frog

133137
de