ietf-asrg
[Top] [All Lists]

Re: 3. Requirements - Anonimity (was Re: FW: [Asrg] 0. General)

2003-10-29 06:07:38
At 3:20 PM -0500 2003/10/27, David Maxwell wrote:

 In the case of Access controls, if someone has a tight consent
 definition such as 'I accept mail from these four people', and if mail
 senders are authenticated, then this recipient will _never_ get
 something outside of that consent definition.

Depends on how you define "mail from these four people", and how you prove beyond a shadow of a doubt that the message did actually come from them. What about messages forwarded by them from other people? Does the message have to originate uniquely from one of these four people, or are they allowed to forward messages that they themselves did not write?

 I don't recall making any criticism of filters besides a) cpu intensive
 and b) can't ever be perfect.

I submit that authentication methods can also be CPU intensive, and usually also have a small percentage of failures, both false negatives and false positives.

--
Brad Knowles, <brad(_dot_)knowles(_at_)skynet(_dot_)be>

"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
    -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E-(---) W+++(--) N+
!w--- O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)

_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg



<Prev in Thread] Current Thread [Next in Thread>