From: "Jim Youll" <jim(_at_)media(_dot_)mit(_dot_)edu>
Well I guess I just don't like your idea, then. It just seems too
arbitrary and specific to a particular protocol working in a particular
(common but NOT universal) way. Nothing else works that way, and this
teaches us nothing about spam-to-IM, spam-to-phones, etc that are all
messaging-based problems, or the new problems created when a third party
is imposed where it isn't needed... legal problems, performance problems,
support issues...
I think any general solution will depend on identity verification, which is
a key part of my plan. Anything else has to build on that. And I think
that the PKI is a firmer foundation than, say, DNS, for doing identity
verification.
I'm not sure what you mean by "nothing else works that way." Certainly
telephones work that way. Your local phone company is responsible for
identifying you, billing you, and investigating complaints against you.
Your phone does not directly contact the phone of the person your are
calling. It does not even contact the local exchange switch of the person
you are calling. In a long distance call, there are generally _three_ other
companies involved.
I haven't been following IM interoperability, but doesn't IM work more like
the telephone system and less like SMTP?
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg