ietf-asrg
[Top] [All Lists]

Re: [Asrg] attention bonds, was Email Postage

2008-11-30 14:24:27
On 2008-11-30 11:55:43 -0600, mathew wrote:
On Sun, Nov 30, 2008 at 11:47, Rich Kulawiec <rsk(_at_)gsp(_dot_)org> wrote:
On Sun, Nov 30, 2008 at 11:24:26AM -0600, mathew wrote:
Since a pwned machine can impersonate the user to any degree
necessary, that means spammers can send e-mail which is identical
to e-mail sourced by the user. Hence you just eliminated all
technical solutions to the problem. So we may as well shut down
the list.

Not "all" technical solutions have been eliminated, just some.


Describe one which hasn't?

Any system which either doesn't care about whether the sending system is
compromised or which puts a noticable burden on the owner of a
compromised system but not the owner of a non-compromised system.

Some examples I can think of:

* Content filters.

* Keyed address systems (where a different email address is used per
  correspondent). When an address is leaked to a spammer, the address
  can be disabled and that correspondent has to aquire a new address.

* Feedback systems where compromised systems can be effectively
  quarantined.


        hp

-- 
   _  | Peter J. Holzer    | Openmoko has already embedded
|_|_) | Sysadmin WSR       | voting system.
| |   | hjp(_at_)hjp(_dot_)at         | Named "If you want it -- write it"
__/   | http://www.hjp.at/ |  -- Ilja O. on 
community(_at_)lists(_dot_)openmoko(_dot_)org

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
https://www.irtf.org/mailman/listinfo/asrg