At 11:07 AM -0400 2003/08/13, Paul Judge wrote:
3) Create tools that sufficiently anonymize the ham so that people are
comfortable submitting it. There is similar work being done in other areas
of networking. One of the difficulties here is anonymizing the data while
preserving the relevant relationships within the data.
In terms of analyzing black list performance, all we need is the
IP address(es) found in the headers of the message. Everything else
is superfluous, and indeed gets in our way.
That should be sufficiently anonymous that there shouldn't be any
problem with people being willing to share that information. Or, so
I would think.
--
Brad Knowles, <brad(_dot_)knowles(_at_)skynet(_dot_)be>
"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
-Benjamin Franklin, Historical Review of Pennsylvania.
GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E-(---) W+++(--) N+
!w--- O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg