<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-05-02T15:50:00+00:00</dc:date>

	
	<item>
		<title> SPIT is in Everyone's Mouth, Though Not Yet in Everyone's Ears (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts86168_spit_everyones_mouth_not_ears</guid>
		<link>https://circleid.com/posts86168_spit_everyones_mouth_not_ears</link>
		<description><![CDATA[Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. <a href="https://circleid.com/posts86168_spit_everyones_mouth_not_ears">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>