Mozilla’s Raindrop – Your Inbox Revamped

Author: Quikclicks  //  Category: Technology, Web News

Mozilla Labs, Mozilla’s innovation group, has developed a new open-source, experimental email and communication platform called Raindrop. Mozilla says that Raindrop was built to be focused on highlighting and breaking out personal conversations, making it easier for you to see all of your conversations in one client. It is designed to “bubble up” the important conversations from your messages

According to the site, Raindrop “is an effort that starts by trying to understand today’s web of conversations, and aims to design an interface that helps people get a handle on their digital world.” Still in prototype form, the platform is very young but it aims categorize messages and then separate the personal messages from bulk messages, so you know what to respond to vs. just noting a communication. So Raindrop will import all of your email, but break out your personalized email from your mailing list emails and will portray the personal emails higher on the page. Raindrop will also separate direct messages and @replies from your stream, acting like a Twitter client And you’ll be able to Tweet from the platform and pull in RSS feeds.

I briefly spoke with one of Raindrop’s lead engineer’s and the CEO of Mozilla Messaging, David Ascher, who told me that in the future iterations the platform should include all types of messaging, including IM, Facebook, FriendFeed, YouTube and basically, any communication with an open API. And according to the site, content with in communications, such as links from YouTube or Flickr should be shown near or as part of the message, rather than in a separate tab. Ascher said that Raindrop doesn’t really aim to replace your Gmail account but add to it with an intelligent way to understand your communications. The application works on Firefox, Safari and Chrome.

Mozilla also wants to developers to build applications off of Raindrop and is releasing its API to help users customize their communications experiences. The back-end of the platform is a non-relational database (CouchDB) which was optimized for massive web interactions. The front-end, says Ascher, uses high-powered JavaScript libraries, modern CSS to give your best browser with the platform. Ascher told me that Raindrop is still very, very early stage but the platform will continue to evolve with time.

It takes page from social media messaging aggregation services like FriendFeed but with a strong focus in filtering. It will be interesting to see what two-way interactions the platform will feature and what content it eventually will bring in. Because its a modern communication system, it could compete with open communications platform Google Wave.

If you’re confused, take a look at the video. It explains the purpose of Raindrop pretty well.

Raindrop UX Design and Demo from Mozilla Messaging on Vimeo.


Article Source

Share

Massive Chinese Click Fraud Ring Uncovered

Author: Quikclicks  //  Category: Online Marketing, Search Engine News, Web News

As long as advertisers pay for clicks, there will be click fraud. And the more people combat it, the more sophisticated the attacks become to get around the defenses that advertisers, search engines, and others put in place. But a recent click fraud ring discovered by click-fraud monitoring service Anchor Intelligence suggests that the practice is evolving to a scale never seen before.

Anchor Intelligence identified a click fraud ring being run out of China which involved 200,000 different IP addresses and racked up more than $3 million worth of fraudulent clicks across 2,000 advertisers in a two-week period. That money was never paid out and the ring has now dissipated (or moved onto another scam), but who knows how long the ring was in operation before Anchor noticed. The operation was called DormRing1 because it was centered in dorms at technical universities in China such as the Shanghai Technology Institute.

“We have seen 200 fraud rings,” says Anchor VP Richard Sim, “and this one by far trumps them all. I think it is indicative of how sophisticated the click fraud is getting. We are seeing the sheer scale and size of these rings growing.”

Click fraud occurs when someone sets up a website, signs up with an ad network, and then clicks on the ads to generate ad revenues with false clicks. DormRing1 operated the same way, except it easily involved more than 1,000 people who set up more than 10,000 Websites to spread out the fraud. The image above depicts a portion of the ring, with each red dot representing a source of fraudulent clicks with similar digital signatures. (Anchor monitors such activity on behalf of advertising clients).

Spreading the click fraud out across thousands of sites makes it harder to detect, but it also requires a lot more people to perpetrate it. DormRing1 recruited student click fraud workers on Chinese social networks where and forums participants would post images of checks they were getting for their activities. One drummed up interest by talking about his plans to buy a car with the proceeds. Just like with any criminal organization, people at the lower rungs had to do a lot of grunt work to move up the ladder of trust and money. A briefing paper provided by Anchor describes the operation:

These social networks involve a complex set of user access levels. The baseline entrance level is only available by invitation; access to sensitive information is restricted solely to those users who have attained the highest levels. Users with the uppermost levels of access are able to purchase root kits to engage in fraudulent activity and contract out phases of their fraud operations to a large network of willing participants. Users reach higher levels of access in one of two ways: either through a vouching system or by proving themselves as valuable contributors to the network through the provision of some ground level of services (e.g. contracting to create hundreds of accounts on various websites).

DormRing1 was able to use these exclusive social networks to create a division of labor in which all participants at the highest levels shared in a percentage of profits from an operation. The students involved in the ring each set up dozens of bare-bones websites, and successfully registered them with multiple ad networks. The students then hired the services of several botnet controllers to systematically click on ad links that were displayed on these sites. For each ad click, the publisher made a percentage of what the advertiser paid for that click. Through this network, the perpetrators were able to contract money mules (i.e. people with US addresses to which checks can be sent), traffic generators / botnet herders, website template developers, and a host of other service providers. After monetizing these fake websites via fraudulent ad clicks, the perpetrators then wired money to their various contractors.

Remember, we only know these details because DormRing1 was stopped. But nobody was arrested. The advertisers just stopped making payments to the fraudulent Websites. You can be pretty sure that DormRing2 is already up and running.


Article Source

Share