Blue Security surrenders

According to Wired News, Blue Security has thrown in the towel.

Update: The Blue Frog code is available on Source Forge and at least one project has been started whose goal is the creation of an OSS frog utilizing P2P communications instead of a central control database. Clearly the methods employed by Blue Security were effective, as the spammers would otherwise have had no reason to commit the resources they did in shutting the company down. A system which used the same method of dealing with received spam but utilized P2P communications between nodes rather than Blue Security’s client/server model would be largely immune to the attackers employed against Blue Security’s network.

This entry was posted in Technology. Bookmark the permalink.