[17190] in cryptography@c2.net mail archive
Re: how email encryption should work (and how to get it used...)
daemon@ATHENA.MIT.EDU (James A. Donald)
Fri May 20 14:11:21 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: Amir Herzberg <herzbea@macs.biu.ac.il>, cryptography@metzdowd.com
Date: Wed, 30 Mar 2005 13:23:45 -0800
In-reply-to: <424A86D3.5090103@cs.biu.ac.il>
--
On 30 Mar 2005 at 13:00, Amir Herzberg wrote:
> A missing element is motivation for getting something
> like this deployed... I think spam could offer such
> motivation;
Phishing is costing billions, and is a major obstacle to
electronic commerce. In my judgment, fixing phishing
and facilitating electronic commerce is a good fit to
the capabilities provided by cryptography. (Of course a
large part of spam is phishing and viruses)
> a cryptographic protocol to penalize spammers could be
> one of the most important tools against spam. I've
> presented such a simple crypto protocol (SICS) in
> SCN'04 [available off my site],
And your site is?
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
To5/mH1p3iCBlpaC6McgYo2aehoFMV42OcrSW6Ze
4AmE3tC68Tiyw+VQHexWjeQmXnrDHI+41ty416j11
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com