On Oct 30, 2013, at 5:26 PM, TSG - personal <tglassey(_at_)earthlink(_dot_)net>
wrote:
1) Separate any voice setup to be isolated
2) Send that person mail to make it look like they are still
participating...
3) Edit their commentary back in to the history file to complete the
covering up of the fraud.
In point of fact, I get the strong impression that plenty of participants in
IETF mailing lists block email from other specific participants, which presents
a small version of the same effect. However, in practice the tampering you
are theorizing about would actually be trivial to detect—just set up two email
addresses with no obvious connection between them, and subscribe them both to
the same mailing list. Send mail from one address; if the other address
doesn't receive it, cry foul.
Let's not be so paranoid that we all wind up crawling into our tortoise shells.