At 05:58 PM 6/13/2003 -0400, waltdnes(_at_)waltdnes(_dot_)org wrote:
On Thu, Jun 12, 2003 at 02:32:47PM -0400, Yakov Shafranovich wrote
> At 10:50 PM 6/10/2003 -0400, waltdnes(_at_)waltdnes(_dot_)org wrote:
> > 2) Yes, I realize that the ISP's MTA will have to keep state
> >information regarding the luser's preferences. However, it comes down
> >to either a) ISP's server doing it (maybe luser enters pre-emptive
> > whitelist/blocklist via web interface), or
> > b) luser administering it on his own MUA (Aunt Ethel or your
> > parents, yeah sure)
>
> Privacy issues are a big concern here. Keep in mind that in the
> USA, this information can be subpoened by many parties ranging from
> the RIAA seeking copyright pirates to the FBI via the FBIS. Some
> approaches here such as using checksums, one way functions,
> cryptography, etc. are needed.
Given those powers, I'd subpeona the ISP's logs instead, or at least a
subset generated by grepping for the suspect's email address as the
destination.
[..]
ISP logs are not around for very long, whitelists for C/R systems are.
Plus, ISP logs might be congregated for thousands and thousands of
customers, while email preferences are unique per user and more easily
identifiable.
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg