Re: technical solutions to spam

New Message Reply About this list Date view Thread view Subject view Author view

mgraffam@idsi.net
Sun, 4 Apr 1999 22:01:29 -0400 (EDT)


On Sun, 4 Apr 1999, Greg Broiles wrote:

> At 06:38 PM 4/4/99 -0400, mgraffam@idsi.net wrote:
> >An alternative is the use PK crypto to give us tokens/stamps for email
> >exchange.
>
> Ick. Now you've added export control issues and patent issues.

DH and DSA for the patents. Good old-fashioned civil disobedience for the
export control. Problem solved :)

> No, we need client-side proxies (at least for Windows and Mac boxes);
> they'll listen on the local machine's POP3 port, talk POP3 with the local
> client (Eudora or Netscape or whatever), make an outbound POP3 connection
> to the user's real mailserver, pull down the mail, process it (bouncing or
> marking unwanted mail), and pass it through to the end-user app.

While this is an excellent idea (as you note in the material I clipped,
development time is likely to be very short) it is also impossible for my
Mom and Dad to set up..

so.. in this case, a really smart install program would be needed to
change the POP configuration of Eudora, Netscape, and/or whatever else is
on the box, install the proxy, and ensure that it will always be running
when their network connection is established.

While I could slug my way through the TCP/IP programming on a Windows box
if I had too.. I've done enough to get my feet wet.. such an install
program is way out of my league since I know basically nothing about such
Windows applications.

> Let's not saddle the "block unwanted mail" problem with the complexity of
> writing & deploying crypto code if it's not necessary - as soon as you
> start monkeying with crypto, you're getting lawyers involved, and that's
> not something you want, trust me. :)

While it is true that deploying crypto can be a bit of a pain, we need to
remember that PGP didn't have any problem making it around the world.. and
PGP is an app few general computer users care about. I've never heard the
average computer user complain about cleartext protocols; but I have
heard a lot of them complain about SPAM.

Tie crypto to a good spam blocker, put it in a program that anyone can
install, and I figure that the program will get around pretty quick..

Michael J. Graffam (mgraffam@idsi.net)
"86% of conspiracy theories have some basis in truth... but, oddly enough,
it's that last 14% that usually gets you killed."
    --Talas (http://cadvantage.com/~algaeman/conspiracy/public.htm)


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Thu May 27 1999 - 23:44:20