Table of Contents
Frequently Asked Questions about Email Obfuscation
What is the main purpose of email obfuscation?
How does email obfuscation work?
Is email obfuscation foolproof?
Does email obfuscation affect the user experience?
Can email obfuscation be used with any email address?
Is email obfuscation a one-time process?
Can email obfuscation be used in conjunction with other spam prevention methods?
Does email obfuscation affect email deliverability?
Is email obfuscation necessary for all websites?
How can I obfuscate my email address?
Home Web Front-end JS Tutorial How to Stop Spam Harvesting With Email Obfuscation

How to Stop Spam Harvesting With Email Obfuscation

Mar 06, 2025 am 01:10 AM

How to Stop Spam Harvesting With Email Obfuscation

The day I discovered the “mailto:” link was glorious. I could publish my address on a web page and anyone could email me with a single click. This was in the more innocent days of the web – before the spam harvesters took over. Use a “mailto:” today and your first viagra message will appear 30 seconds later. So how can you publish an email address without attracting unwanted attention from spammers? The most obvious solution is to use a machine-unreadable email in your HTML, e.g. “bob (at) bobsdomain dot com”. Whilst this makes it difficult for spammers, it also makes it difficult for your users. How to Stop Spam Harvesting With Email Obfuscation Another option is to generate the email address using JavaScript, perhaps with a little string concatenation or encoding e.g.
<p>contact 
<script type="text/javascript">
document.write('<a href="mai'+"lto"+"bob"+'@'+'bobsdomain.com">bob@'+"bobsdomain.com</a>");
</script>
</p>
Copy after login
This will stop most spammers, but anyone with JavaScript disabled will not see your address. (I would not recommend using document.write either.) A better solution is to use a combination of techniques to thwart spammers without causing user difficulties. The first step is to use a human-readable but harvester-proof email address in our HTML. We will also make this a link to a contact page, e.g.
<p>Contact <a href="contact.html" >bob (at) bobsdomain dot com</a></p>
Copy after login
Note that we have included a class of “email” so our link can be identified. The next step is to write a JavaScript function which searches your page for obfuscated emails and transforms them into real “mailto:” links. We will create a ’email.js’ file and include it in our HTML:
<script type="text/javascript" src="email.js"></script>
Copy after login
The required code is short, so we do not need a JavaScript library: Content of email.js:
function EmailUnobsfuscate() {
	
	// find all links in HTML
	var link = document.getElementsByTagName && document.getElementsByTagName("a");
	var email, e;
	
	// examine all links
	for (e = 0; link && e < link.length; e++) {
	
		// does the link have use a class named "email"
		if ((" "+link[e].className+" ").indexOf(" email ") >= 0) {
		
			// get the obfuscated email address
			email = link[e].firstChild.nodeValue.toLowerCase() || "";
			
			// transform into real email address
			email = email.replace(/dot/ig, ".");
			email = email.replace(/(at)/ig, "@");
			email = email.replace(/s/g, "");
			
			// is email valid?
			if (/^[^@]+@[a-z0-9]+([_.-]{0,1}[a-z0-9]+)*([.]{1}[a-z0-9]+)+$/.test(email)) {
			
				// change into a real mailto link
				link[e].href = "mailto:" + email;
				link[e].firstChild.nodeValue = email;
		
			}
		}
	}
}
Copy after login
An explanation of the code:
  1. Line 4 fetches every link in our HTML page and line 8 loops through them.
  2. Line 11 checks the link for a class of “email”.
  3. Line 14 grabs the obfuscated email from the text content of the node.
  4. Lines 17 to 19 transform it to a real email address using regular expressions: “dot” is changed to a “.”, “(at)” is changed to “@”, and all spaces are removed.
  5. Line 22 checks the resulting email address is valid.
  6. Lines 25 and 26 then modify the DOM node and make it into a real “mailto:” link.
Finally, we need to ensure the function runs on page load by adding a line to the bottom of email.js:
window.onload = EmailUnobsfuscate;
Copy after login
The result:
  • Our original HTML page contains no “mailto:” links and cannot be easily harvested by spammers.
  • The majority of users (those with JavaScript enabled) will see a standard email address and “mailto:” link.
  • Anyone not running JavaScript will see the readable “bob (at) bobsdomain dot com” address.
This intention of this article is to show the concept rather than real code. Although the example works, I suggest you:
  • Use your own obfuscated email format, e.g. “bob {@}bobsdomain -dot- com”. Spammers can read this article and transform encoded emails just as easily as you!
  • Use a different link identifier class – “email” is a little obvious!
  • Use a JavaScript library, such as jQuery, to make the function shorter. You should also ensure it copes with whitespace or other DOM nodes around the email address text (not handled in the code above).
  • Replace the window.onload with a more robust event handler.
Best of luck.

Frequently Asked Questions about Email Obfuscation

What is the main purpose of email obfuscation?

Email obfuscation is primarily used to protect email addresses from being harvested by spammers. It involves disguising or encoding the email address in a way that makes it difficult for automated programs, known as bots, to recognize or collect it. However, it still remains readable and usable for human visitors. This technique is crucial for website owners who want to display their email addresses publicly but want to avoid receiving unsolicited emails.

How does email obfuscation work?

Email obfuscation works by encoding or disguising the email address in a way that is difficult for bots to decipher. This can be done in several ways, such as using character entities, JavaScript, or CSS tricks. For example, an email address like “info@example.com” can be obfuscated as “info(at)example(dot)com”. Despite the obfuscation, the email address remains functional and can be used normally by human visitors.

Is email obfuscation foolproof?

While email obfuscation can significantly reduce the amount of spam you receive, it is not completely foolproof. Sophisticated bots may still be able to decipher obfuscated email addresses. However, it does add an extra layer of protection and makes it more difficult for spammers to harvest your email address.

Does email obfuscation affect the user experience?

If done correctly, email obfuscation should not negatively impact the user experience. The obfuscated email address should still be readable and usable for human visitors. However, it’s important to ensure that the obfuscation method used does not interfere with the functionality of the email address.

Can email obfuscation be used with any email address?

Yes, email obfuscation can be used with any email address. It is a technique that is independent of the email provider or the domain of the email address. It can be used with personal, business, or institutional email addresses.

Is email obfuscation a one-time process?

Email obfuscation is not necessarily a one-time process. As spammers and their bots become more sophisticated, it may be necessary to update or change your obfuscation methods to ensure continued protection.

Can email obfuscation be used in conjunction with other spam prevention methods?

Yes, email obfuscation can and should be used in conjunction with other spam prevention methods for maximum protection. This can include techniques such as CAPTCHA, spam filters, and using contact forms instead of displaying email addresses publicly.

Does email obfuscation affect email deliverability?

No, email obfuscation does not affect email deliverability. The obfuscation only affects how the email address is displayed, not how it functions. Emails sent to an obfuscated email address will be delivered as normal.

Is email obfuscation necessary for all websites?

While not all websites may need email obfuscation, it is highly recommended for websites that display email addresses publicly. This includes business websites, blogs, forums, and any other website where email addresses need to be accessible to visitors.

How can I obfuscate my email address?

There are several methods to obfuscate your email address, including using character entities, JavaScript, or CSS tricks. There are also online tools and plugins available that can obfuscate your email address for you. The method you choose will depend on your specific needs and technical capabilities.

The above is the detailed content of How to Stop Spam Harvesting With Email Obfuscation. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1664
14
PHP Tutorial
1269
29
C# Tutorial
1248
24
JavaScript Engines: Comparing Implementations JavaScript Engines: Comparing Implementations Apr 13, 2025 am 12:05 AM

Different JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.

Python vs. JavaScript: The Learning Curve and Ease of Use Python vs. JavaScript: The Learning Curve and Ease of Use Apr 16, 2025 am 12:12 AM

Python is more suitable for beginners, with a smooth learning curve and concise syntax; JavaScript is suitable for front-end development, with a steep learning curve and flexible syntax. 1. Python syntax is intuitive and suitable for data science and back-end development. 2. JavaScript is flexible and widely used in front-end and server-side programming.

JavaScript: Exploring the Versatility of a Web Language JavaScript: Exploring the Versatility of a Web Language Apr 11, 2025 am 12:01 AM

JavaScript is the core language of modern web development and is widely used for its diversity and flexibility. 1) Front-end development: build dynamic web pages and single-page applications through DOM operations and modern frameworks (such as React, Vue.js, Angular). 2) Server-side development: Node.js uses a non-blocking I/O model to handle high concurrency and real-time applications. 3) Mobile and desktop application development: cross-platform development is realized through ReactNative and Electron to improve development efficiency.

How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration) How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration) Apr 11, 2025 am 08:22 AM

This article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base

Building a Multi-Tenant SaaS Application with Next.js (Backend Integration) Building a Multi-Tenant SaaS Application with Next.js (Backend Integration) Apr 11, 2025 am 08:23 AM

I built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing

From C/C   to JavaScript: How It All Works From C/C to JavaScript: How It All Works Apr 14, 2025 am 12:05 AM

The shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.

JavaScript and the Web: Core Functionality and Use Cases JavaScript and the Web: Core Functionality and Use Cases Apr 18, 2025 am 12:19 AM

The main uses of JavaScript in web development include client interaction, form verification and asynchronous communication. 1) Dynamic content update and user interaction through DOM operations; 2) Client verification is carried out before the user submits data to improve the user experience; 3) Refreshless communication with the server is achieved through AJAX technology.

JavaScript in Action: Real-World Examples and Projects JavaScript in Action: Real-World Examples and Projects Apr 19, 2025 am 12:13 AM

JavaScript's application in the real world includes front-end and back-end development. 1) Display front-end applications by building a TODO list application, involving DOM operations and event processing. 2) Build RESTfulAPI through Node.js and Express to demonstrate back-end applications.

See all articles