What is being proposed.

Free businesses and in general all users of email, the financial sacrifice they have to incur to get rid of e-waste, its threats and its associated losses without resorting to third parties without the risk and losing important messages therefore an infrastructure whole. .

Why is it unique? …Where does the project is innovative?

The assumption must be that the recipient to bear the associated costs of any type of electronic messages, belongs to a paradigm. The P2T project[1] removes the existing cost on the recipient and passes it to the sender through a “flow control by selection.” No other method has the purpose of effecting the lock on the origin of the message without using filters. The lawsuit filed by the recipient to allow only what you want to receive, eliminates the need to intervene with anti-spam legislation, eliminates the need for parallel services to manage enterprise email, eliminates the risk of error sympathy practiced a user to open mail infected and eliminates the need to intervene in constant readjustments of filters applied.

Captivate. What are the major arguments of the project.

At a time when a large proportion of countries around the world suffer an unfavorable economic climate, this project can respond to a global economy, allowing freeing the entire of internet world of a high percentage (85% +/-) of e-waste circulating through it, creating free space in bandwidth, for what is most important. The risks associated such as cyber threats are controlled, preventing their losses that may result therefrom. Proactive actions that this model gives, is intended to prevent serious damage that last year alone amounted at 2.8 billion dollars of lost productivity for European companies, while North American reported a loss of $ 20 billion.

Definition and classification of spam.

In general, it is considered “spam” as all messages of a commercial nature unsolicited (Unsolicited Commercial Email – UCE). But also messages addressed to other recipients that contain threats such as phishing scams and dangerous attachments as “unsolicited”. Messages sent and the vast replicated in large volume for most recipients are also considered spam (Unsolicited Bulk Email – UBE).

Spam is simply an unsolicited message. However, this general definition is conflicting and also has a subjective character. A message may be considered as spam to a particular user and may not be considered to another. Therefore, the definition of what may be considered spam or not, is already a first challenge.

Due to the difficulty asserting what spam is, the rules in force and draft laws under discussion worldwide, define a set based on common characteristics found in messages classified as spam. Therefore, when a message does not meet the defined rules, is considered SPAM.

The reason for the existence of spam is associated with three factors: the ease with which recipient addresses are obtained, sending zero cost and the number of recipients that can be achieved with a single message.

And this is where the P2T method, works. The user’s ability power without fear disclose your address and assert themselves as free and able to choose what really interests you even before the sender can send whatever it was. With this model, thus collapses the concept of spam and all legislation that defines their rules.

[1] Acronym for “Permission to Transmit