-
-
Notifications
You must be signed in to change notification settings - Fork 18.5k
WEB: Obfuscate workgroup email addresses #51209
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi, First time contributor to Pandas here. There are many ways to obfuscate emails on websites & prevent bots from scraping them for e.g. :
A few resources which I found were as follows : As per my understanding of the scope of work for this issue, I would need to edit the Markdown file mentioned by you to parse the text differently but display it as close to the email id as possible. If so, please let me know if I can work on this issue. Thanks & Regards |
Thanks for the help @Kabiirk. What you say is correct, just keep in mind these goals:
Some of the things you mention make a lot of sense, but seem to overcomplicate things too much, since it'd require writing code that does the encoding or transformation of the email address in our web generator script. That's what I thought that just prepending some text to the addresses was a better idea. In any case, it's great if you can work on this, and I'm open to ideas, just keep in mind those goals. Thanks! |
Thanks, to assign this issue to me, to I need to do a |
I assigned it to you. For next time, yes, you need to write just |
Thanks, |
Hi, Facing some challenges Challenge 1While building the website from source (
The static site is being generated, but looks like this while the Official site looks like this: Potential ReasonWay ForwardI think This is a rate-limiting & a CSS thing, Since my main work is with Emails, I don't think this should be a problem. I'll carry on with my work. But since I am going to run this command frequently during testing, I hope there would be no issues if I do that ? Challenge 2Also, while initially building the static site, I got the following error at 4 instances: the LOC instances which caused these errors were : Lines 113 to 114 in 11d856f
Lines 343 to 344 in 11d856f
Lines 415 to 416 in 11d856f
Lines 425 to 426 in 11d856f
so I did some troubleshooting & found out that this error is caused because because we aren't telling the Potential ReasonOS : Windows 10 Home Single Language Possible Fix [This has only been implemented in my local Branch] :In all 4 instances, I modified
Way ForwardAfter I am done with the current issue I am working on, Should I open a separate issue for this ? |
Thanks for the work on this @Kabiirk, sounds great. Sure, go ahead and open the PR (for next time, feel free to open a PR anytime, even if you're unsure of the approach...). You can tag me on it. |
@datapythonista Thanks for the help 😄 ! I'll keep that in mind. Opening the PR in a while. Please do let me know if I should open an Issue for the |
* WEB: Obfuscating workgroup email addresses to fix Issue #51209 * WEB: Fixtrailling whitespace: Obfuscating workgroup email addresses to fix Issue * WEB: Obfuscated & regex-proof workgroup email addresses * WEB: refactor suggestions post code review --------- Co-authored-by: Marc Garcia <[email protected]>
We recently added our workgroup email addresses to our website: https://pandas.pydata.org/about/team.html#workgroups
While this has been useful, and we received relevant emails from people that otherwise wouldn't know how to contact us easily, we also started receiving spam. I'm unsure if spam is generated manually by people ending up in our website, or by bots fetching our email addresses automatically. But in case it's the latter, I think it'd be good to see if we can easily obfuscate the email addresses in the html code.
I guess there are many options, but it comes to my mind that something very easy that could possibly stop some of the spam would be to simply prepend a string to the email addresses in the html, and then remove it via javascript. This won't help with spammers getting our addresses manually, or using scrappers with javascript support like selenium, but with some luck most of the spam comes from simpler bots just fetching the html.
The idea would be that for example if the address is
[email protected]
, the html generated from the markdown is something like<a href="mailto:[email protected]">[email protected]</a>
, and then we have a simple javascript block that removes theno
and makes the final html rendered to the user contain the right address.This is the file where this should be implemented: https://github.com/pandas-dev/pandas/blob/main/web/pandas/about/team.md#-workgroupname-
The text was updated successfully, but these errors were encountered: