How it works
This plugin searches for
mailto: strings in href attributes and all plain text
email addresses in the html output. However, only email addresses like
firstname.lastname@example.org are matched whereas
Tog@ther is left untouched.
Matches of all plaintext emails and email links are consequently replaced with
Decryption routines triggered by the browser on
window.onload event are
located in the script file
emo.js. Optionally, CSS class
emo_address can be
used to configure the appearance of email links.
It is still believed that hexadecimal or unicode encoding will stop spam-bots
being able to find your email address. Nevertheless, encoded email address
harvester are on the way. Unlike other obfuscation plugins, this one uses real
encryption instead of using an out-dated and over-used hack such as hexadecimal
or unicode encoding (not encryption) of email addresses. Also, all traces of
href attributes as well as
mailto: strings and
@ characters are hidden from
The plugin does not modify adresses inside
<form> tags. So posted and not
validated forms do not break. Sections between
<!-- emo-exclude --> and
<!-- /emo-exclude --> are excluded from replacement.
that ID is generated. This could i.e. point to a resouce with a contact form.
emo uses the following system settings in the namespace
|css_path||Path to emo css|
|selection_range||Comma separated list of enabled/disabled resource IDs for emo|
|selection_type||Selection type for enabled/disabled resources for emo||-|
|tpl_only||Don't work on resources with blank template||Yes|