How to Stop Spam Harvesting With Email Obfuscation

<p>contact <script type="text/javascript"> document.write('<a href="mai'+"lto"+"bob"+'@'+'bobsdomain.com">bob@'+"bobsdomain.com</a>"); </script> </p>
<p>Contact <a href="contact.html" >bob (at) bobsdomain dot com</a></p>
<script type="text/javascript" src="email.js"></script>
function EmailUnobsfuscate() { // find all links in HTML var link = document.getElementsByTagName && document.getElementsByTagName("a"); var email, e; // examine all links for (e = 0; link && e < link.length; e++) { // does the link have use a class named "email" if ((" "+link[e].className+" ").indexOf(" email ") >= 0) { // get the obfuscated email address email = link[e].firstChild.nodeValue.toLowerCase() || ""; // transform into real email address email = email.replace(/dot/ig, "."); email = email.replace(/(at)/ig, "@"); email = email.replace(/s/g, ""); // is email valid? if (/^[^@]+@[a-z0-9]+([_.-]{0,1}[a-z0-9]+)*([.]{1}[a-z0-9]+)+$/.test(email)) { // change into a real mailto link link[e].href = "mailto:" + email; link[e].firstChild.nodeValue = email; } } } }
- Line 4 fetches every link in our HTML page and line 8 loops through them.
- Line 11 checks the link for a class of “email”.
- Line 14 grabs the obfuscated email from the text content of the node.
- Lines 17 to 19 transform it to a real email address using regular expressions: “dot” is changed to a “.”, “(at)” is changed to “@”, and all spaces are removed.
- Line 22 checks the resulting email address is valid.
- Lines 25 and 26 then modify the DOM node and make it into a real “mailto:” link.
window.onload = EmailUnobsfuscate;
- Our original HTML page contains no “mailto:” links and cannot be easily harvested by spammers.
- The majority of users (those with JavaScript enabled) will see a standard email address and “mailto:” link.
- Anyone not running JavaScript will see the readable “bob (at) bobsdomain dot com” address.
- Use your own obfuscated email format, e.g. “bob {@}bobsdomain -dot- com”. Spammers can read this article and transform encoded emails just as easily as you!
- Use a different link identifier class – “email” is a little obvious!
- Use a JavaScript library, such as jQuery, to make the function shorter. You should also ensure it copes with whitespace or other DOM nodes around the email address text (not handled in the code above).
- Replace the window.onload with a more robust event handler.
Frequently Asked Questions about Email Obfuscation
What is the main purpose of email obfuscation?
Email obfuscation is primarily used to protect email addresses from being harvested by spammers. It involves disguising or encoding the email address in a way that makes it difficult for automated programs, known as bots, to recognize or collect it. However, it still remains readable and usable for human visitors. This technique is crucial for website owners who want to display their email addresses publicly but want to avoid receiving unsolicited emails.
How does email obfuscation work?
Email obfuscation works by encoding or disguising the email address in a way that is difficult for bots to decipher. This can be done in several ways, such as using character entities, JavaScript, or CSS tricks. For example, an email address like “info@example.com” can be obfuscated as “info(at)example(dot)com”. Despite the obfuscation, the email address remains functional and can be used normally by human visitors.
Is email obfuscation foolproof?
While email obfuscation can significantly reduce the amount of spam you receive, it is not completely foolproof. Sophisticated bots may still be able to decipher obfuscated email addresses. However, it does add an extra layer of protection and makes it more difficult for spammers to harvest your email address.
Does email obfuscation affect the user experience?
If done correctly, email obfuscation should not negatively impact the user experience. The obfuscated email address should still be readable and usable for human visitors. However, it’s important to ensure that the obfuscation method used does not interfere with the functionality of the email address.
Can email obfuscation be used with any email address?
Yes, email obfuscation can be used with any email address. It is a technique that is independent of the email provider or the domain of the email address. It can be used with personal, business, or institutional email addresses.
Is email obfuscation a one-time process?
Email obfuscation is not necessarily a one-time process. As spammers and their bots become more sophisticated, it may be necessary to update or change your obfuscation methods to ensure continued protection.
Can email obfuscation be used in conjunction with other spam prevention methods?
Yes, email obfuscation can and should be used in conjunction with other spam prevention methods for maximum protection. This can include techniques such as CAPTCHA, spam filters, and using contact forms instead of displaying email addresses publicly.
Does email obfuscation affect email deliverability?
No, email obfuscation does not affect email deliverability. The obfuscation only affects how the email address is displayed, not how it functions. Emails sent to an obfuscated email address will be delivered as normal.
Is email obfuscation necessary for all websites?
While not all websites may need email obfuscation, it is highly recommended for websites that display email addresses publicly. This includes business websites, blogs, forums, and any other website where email addresses need to be accessible to visitors.
How can I obfuscate my email address?
There are several methods to obfuscate your email address, including using character entities, JavaScript, or CSS tricks. There are also online tools and plugins available that can obfuscate your email address for you. The method you choose will depend on your specific needs and technical capabilities.
The above is the detailed content of How to Stop Spam Harvesting With Email Obfuscation. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











Different JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.

Python is more suitable for beginners, with a smooth learning curve and concise syntax; JavaScript is suitable for front-end development, with a steep learning curve and flexible syntax. 1. Python syntax is intuitive and suitable for data science and back-end development. 2. JavaScript is flexible and widely used in front-end and server-side programming.

JavaScript is the core language of modern web development and is widely used for its diversity and flexibility. 1) Front-end development: build dynamic web pages and single-page applications through DOM operations and modern frameworks (such as React, Vue.js, Angular). 2) Server-side development: Node.js uses a non-blocking I/O model to handle high concurrency and real-time applications. 3) Mobile and desktop application development: cross-platform development is realized through ReactNative and Electron to improve development efficiency.

This article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base

I built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing

The shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.

The main uses of JavaScript in web development include client interaction, form verification and asynchronous communication. 1) Dynamic content update and user interaction through DOM operations; 2) Client verification is carried out before the user submits data to improve the user experience; 3) Refreshless communication with the server is achieved through AJAX technology.

JavaScript's application in the real world includes front-end and back-end development. 1) Display front-end applications by building a TODO list application, involving DOM operations and event processing. 2) Build RESTfulAPI through Node.js and Express to demonstrate back-end applications.
