Home |
Search |
Today's Posts |
#3
![]() |
|||
|
|||
![]()
On 4/22/2016 3:59 PM, rickman wrote:
On 4/22/2016 2:47 PM, N6PSE via rec.radio.amateur.moderated Admin wrote: n6pse /////////////////////////////////////////// Cluster abuse.. Posted: 22 Apr 2016 09:03 AM PDT https://n6pse.wordpress.com/2016/04/22/cluster-abuse/ Todays topic is about why I strongly dislike DX Summit. DX Summit was recently overhauled and much improved. Unfortunately it is still a rather simple process to spoof or fake a submitters call sign. While there is technology to prevent this, the owners of DX Summit have not implemented it. Today, my own call sign is being abused on DX Summit as it is being spoofed to initiate fake P5 DX spots. I call upon the owners/operators of DX Summit to fix your cluster to prevent this abuse! What do you think? Is there really technology to prevent this? Normally it requires substantial cryptography or validation through some key info that can be verified. I agree, rickman. I wonder what technology he's referring to. Does he mean someone has to mail/fax a copy of his/her ham license (which could still easily be forged, nowadays)? Or something else? -- ================== Remove the "x" from my email address Jerry, AI0K ================== |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
DX Cluster Available | Dx | |||
Question About DX Cluster | Dx | |||
Question About DX Cluster | Dx | |||
DX Cluster | Dx | |||
DX Cluster | Dx |