A lot of energetic folks are working up a lather on the Blue Security forums at CastleCops and all over SlashDot. In fact the whole web is a-buzz with Peer to Peer re-engineering of the Blue Frog concept now that it has been proven to work so effectively within the constraints of the law.
I'm 100% behind the idea, however I'm noticing a lot of folks are not paying attention to some key issues. In general people are glossing over everything that Blue Security did in their headquarters and focusing on the little frog client. (Which didn't do much in and of itself.)
In the interest of helping in some small way, following are my collected thoughts on the matter.
The CAN-SPAM legislation: It had no teeth, and it's provisions were vague - even seemingly useless. But it did establish the right to OPT OUT. Our problem under this framework now is that we don't have the technology (yet) to exercise this right to Opt Out in equal measure to the UCE (spam) we receive. At 500 spam per day, I could never match spammer's horsepower alone, but with a little backup from other frogs and an automation tool... Well, the landscape changes. Blue Security proved this.
SO! Spammers have automatic systems to advertise to us. We need automatic systems to opt out. Let us never send more than one Opt-Out for each e-mail received.
To keep everyone straight on this point I suggest a core and direct mission statement should be crafted to keep in mind and rally behind. Print it on mugs and mouse pads. Keep these thoughts in mind.
Proposed mission statement:
"The goal of the Black Frog project is to empower the public with the ability to exercise it's legal right to request removal from Unsolicited Commercial E-mail distribution (UCE). This will be accomplished by creating a tool that will safely and legally automate the Opt-Out process in equal and fair proportion to the methods used by advertisers to send UCE in the first place."
Relating to architecture:
The noble conversations in these forums (and I do think everyone is very noble to take up this cause) seem to be glossing over key parts of the puzzle that Blue Security had built into their servers which were under lock and key. The source code for the little frog client won't get you very far. I'll list the server side strengths which need to be emulated by the proposed P2P system here.
Strength #1: By collecting MILLIONS of e-mail per week, Blue Security could analyze millions of e-mails per week and find the patterns behind the origins of spam as well as what services were being advertised. Since so much spam came from compromised sources, no attempt should be made to touch them - only to identify them and pass along the data to the responsible ISP's and Enforcement agencies. The Blue Frog client has no analytical capabilities. Learning how to do this is what may make Blue Security rich some day.
P2P Challenge #1: Figure out what analysis tools Blue Security used and/or develop them independently. Devise a way to conduct distributed analysis and data aggregation to make Opt-Out decisions and to then feed into reporting tools. If the FBI and others could have access to a real time and reliable source of data on UCE activity as they did while Blue Security was doing it, they would probably be on your side. It would be a Real Time Black List on steroids with IP numbers, statistics on spam generated, sites advertised from that server, illegal penny stock scams, worm distribution sources, compromised bot clients and their ISP's, and on and on.
*** THIS is what scared the excrement out of the spammers and caused them to start a no-holds barred fight. As long as this information is scattered across the web, they are safe. When all this data is collected in one place, it eliminates places for them to hide and will force them to become responsible.
Strength #2: Identification of the companies which stood to profit from this method of advertisement. Where blue security hurt the Spammers next was by registering complaints to the advertised services in a volume that made the advertised company question if they wanted to continue to advertise through the guilty Spammer. What pill seller wants to sift through thousands of opt-out requests searching for one legitimate sale? (If it can be called legitimate..) Each Opt-Out only represented one e-mail and with only 400,000 protected e-mail accounts it was very effective. (Pre-Mayday figures when the BF clients were still cranking away. They never had .5M protected e-mails when the system was still up.)
P2P Challenge #2: Develop method to gobble up local spam and accurately cut through the subterfuge and countermeasures employed by spammers to lodge legal requests for list removal at the advertised service. I see no way this could be done without an oversight committee that scouted ahead of the frogs to determine if the collected data warranted an Opt-Out campaign. To let every P2P client run amok would weaken the project. Someone somewhere needs to stand up and be willing to coordinate this effort and then be attacked when the going gets tough. They will need powerful Google/Microsoft sized friends for the first few years to fend off and counterbalance the criminal syndicates. I am ruling out government assistance because they are generally non-responsive and technologically inept. They have crafted a law for us to work within. It's for us to use it.
Strength #3: Provide a safe and simple means for responsible UCE advertisers to clean users from their lists. Blue security provided a great service with their list cleaning utility. It needs to be that simple for the spammer. Run a program, input the list, proceed with the output list.
*** There is NO WAY around the spammer learning who the users are. Everyone needs to get real with this. Any tool that removes you from an e-mail list will reveal you when the old and new lists are compared. Once the system matures, it may very well turn into a matter of pride to have your e-mail associated with this Frog service, but until then - it needs to be disclaimed up front when using this hypothetical P2P tool that anyone who cares enough can figure out if you are a member through difference testing e-mail lists. But since they already have your address and are spamming you - what do you have to lose? (I personally went from 200 spam per day pre-attack to 500 spam today. There is no difference in my day to day life.)
P2P Challenge #3: Develop a simple way for Spammers to clean their lists. If it isn't REALY easy, nobody will do it. One obvious (but exceedingly difficult thing to code) would be to have each and every client capable of "growing" it's own list of individual e-mail hashes over time via an aggregator option (default off). A simple companion utility could then process this hash list against a text file list of addresses when required. Pro's and Con's of this idea are too many to list here, but I'm just sending ideas up the flag pole.
Strength #4: Trained human intervention. The spammers have all day to play cat and mouse games devising countermeasures to the countermeasures. No automated system can defeat a group of humans devoted to breaking it. Humans need to be involved constantly to provide executive guidance on both Opt-Out campaigns and on software development. I've seen several good ranking / voting schemes to control Opt-Out campaigns. Also people are already talking about things like Captcha countermeasures and other endless improvements. The software tools on both sides of the fence will evolve and he who can't match pace will loose.
P2P Challenge #4: Create a decentralized group of trusted individuals who make the system work and keep it working. Have a public face that can be seen by all, can manage PR and offer a trusted source for information on the system and provide safe downloads for potential customers. (At least while not under DDoS attack.)
Summary:
I dare to say that the little Blue Frog client application was the easy part. The heavy lifting was happening inside of Blue Security Headquarters. If these things can be shifted to a P2P topography effectively, it will work. But money will be -the- limiting factor at some point in this projects evolution.
Benefits of P2P are clear:
During attacks which might take down your main public presence on the web, the distributed system would continue to do it's job indefinitely.
Learning from those who have gone before us:
Blue Frog didn't have P2P technology, it was a central server to many clients arrangement. Despite this one limiation though, it DID have all of the other puzzle pieces in place. We shouldn't underestimate the challenges that lay ahead in emulating what Blue Security got right. The Blue Security client Public License source code is the least of our concerns as a serious software engineering project is involved.
God willing though, perhaps it can be done. Can't be harder than getting to the moon can it?