The 'eet' Nuisance Has Many Proxies/Indentities
- Dr. Roy Schestowitz
- 2007-11-27 23:36:05 UTC
- Modified: 2007-11-27 23:51:19 UTC
The
abusive character/s known as 'eet' (and dozens of variations of this name) is/are trying hard to get its/their personal attacks through and into this Web site. What's curious is the wide variety of IP addresses that 'eet' is/are able to pull, even just minutes apart.
Recent examples (from the past hour alone):
- 200.144.17.34 (smtp.jales.sp.gov.br)
Yes, that's 'eet' posting from the government of Brasil.
- 210.87.251.43 (tmhaos04.imsbiz.com)
Care to join 'eet' from Honk Kong?
- 78.54.161.141 (f054161141.adsl.alicedsl.de)
That's a German ISP.
- 85.116.205.64 (64-205-116-85.dsl.manitu.net)
Another one.
'eet' seems to be getting around a little too much. Either it's not one person, or that person has an extraordinary reach to many computer resources around the world, including the Brasilian government (maybe it's a zombie PC). The more you find out about this 'eet' phenomenon, the more amazed you become. Someone who can post 40 comments in just one day (especially in a site that which asked it to go away) truly raises suspicion.
We'll continue our attempts to intercept abusive trolling, but it seems to be getting harder. Perhaps the high levels of site traffic have given someone reason for concern.
⬆
Comments
Jim Powers
2007-11-28 05:24:25
a) some [insert colorful description here] or several of said are essentially joy-riding. Getting off on trying to hack their way in to the site. It's becoming a personal challenge.
b) A clearly obsessed individual, ironically, considering how many times he's suggested that Roy get a life seems to have all but dedicated his life to dropping random blobs of nonsense here. The downside is that sick people are potentially dangerous.
c) A "professional" agent. Hired by the organizations criticized here yo actively harass this site and spread disinformation.
Couple of potential next steps:
1. Suppress the comments altogether. Unfortunately you will have to evaluate each post and decide for yourself if this is a post from the "offending parties" or not.
2. Consider exposing more information. Perhaps along with the nifty troll banner on the bottom of each post you can also publish the email used and the IP address with whois information of where the post came from.
You may have to go to a "close loop" identification system. One where you will have to have a validated e-mail address. So you'll need a full sign-on and send out a validation e-mail with a code to close the loop. At least then he'll have to keep making e-mail addresses. Of course this just means that he/she/it will have to keep creating e-mail accounts to sign up. But every time you shut down an account they will have to do it again.
Anyway, my two cents. If I'd have to guess though, I'd be thinking professional infiltrator. A.K.A. union buster or some such.
Roy Schestowitz
2007-11-28 05:50:58
Tracy Reed
2007-11-28 06:07:17
Roy Schestowitz
2007-11-28 06:47:10
Yes, I've considered this. I'm aware of other people who do this (and if you keep an eye on USENET, you probably know which people I'm referring to).