Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    text
    copied!<p>Ultimately, this is an uphill, loosing battle. If there will be incentive to beat the system, someone will try and they will eventually succeed. (See for example: every DRM scheme ever implemented.)</p> <p>That said, there are strategies to reduce the ease of gaming the system.</p> <ul> <li>I wouldn't really consider FB accounts to be <em>that</em> secure. The barrier to creating a new FB account is probably negligibly higher than creating a new webmail account.</li> <li>Filtering by IP address is bound to be a disaster. There may be thousands of users behind a proxy on a single IP address (<em>cough</em>, AOL), and a scammer could employ a botnet to distribute each account requests to a unique IP. It is likely to be more trouble than it is worth to preemptively block IPs, but you could analyze the requests later&mdash;for example, before actually sending the reward&mdash;to see if there's lots of suspicious behavior from an IP.</li> <li>Requiring a credit card number is a good start, but you've already ruled that out. Also consider that one individual can have 10 or more card numbers between actual credit cards, debit cards, and one-time-use card numbers.</li> <li>Consider sending a verification code via SMS to PSTN numbers. This will cost you some money (a few cents per message), but it also costs a scammer a decent amount of change to acquire a large number of phone numbers to receive those messages. (Depending on the value of your incentive, the cost a prepaid SIM may make it cost-prohibitive.) Of course, if a scammer already has many SMS-receiving PSTN numbers at his disposal, this won't work.</li> </ul>
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload