<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<br>
<br>
<div class="moz-cite-prefix">On 07/12/2022 7:37 am, Dirk Koopman via
Dxspider-support wrote:<br>
</div>
<blockquote type="cite"
cite="mid:4c40c008-da2a-f0f4-3a68-6638dbe5e1b7@tobit.co.uk"><span
class="mw-parser-output"><br>
But I see it is a development by the ROSMODEM chap. When that
first appeared it caused quite a few problems on the network as
it was using a lot of cluster node bandwidth</span></blockquote>
<br>
A brief history lesson on ROSMODEM and its developer.<br>
<ul>
<li>The ROS software would post spots to DXSpider nodes pretending
to be a human using a number of different inbuilt message types
to give the impression the spots were human originating. The
volume of spots and the repeated spot formats gave that away.</li>
<li>While running the software, monitoring activity only, no QSOs,
the software would be posting spots giving the impression that
the spot was for an actual QSO when there was no QSO.<br>
</li>
<li>As nodes started to implement registration to block this
behavior the ROS software would be updated with differing lists
of unsecured nodes to auto-spot to.</li>
<li>When the ROS author was called out about the auto-spotting he
started to include hard-coded list of the callsigns reporting
this behavior, a blacklist of callsigns that were prevented from
running the software. I know because I ended up on the blacklist
because of calling him out about his software activity. It was
easy to see the hard-coded blacklist, DXSpider nodes and
auto-spot message formats by simply doing a hex-dump of the ROS
executable.</li>
</ul>
<p>Just a warning.</p>
<p>de Laurie VK3AMA<br>
<br>
</p>
</body>
</html>