[17190] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: how email encryption should work (and how to get it used...)

daemon@ATHENA.MIT.EDU (James A. Donald)
Fri May 20 14:11:21 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: Amir Herzberg <herzbea@macs.biu.ac.il>, cryptography@metzdowd.com
Date: Wed, 30 Mar 2005 13:23:45 -0800
In-reply-to: <424A86D3.5090103@cs.biu.ac.il>

    --
On 30 Mar 2005 at 13:00, Amir Herzberg wrote:
> A missing element is motivation for getting something 
> like this deployed... I think spam could offer such 
> motivation;

Phishing is costing billions, and is a major obstacle to 
electronic commerce.   In my judgment, fixing phishing 
and facilitating electronic commerce is a good fit to 
the capabilities provided by cryptography.  (Of course a 
large part of spam is phishing and viruses)

> a cryptographic protocol to penalize spammers could be
> one of the most important tools against spam. I've
> presented such a simple crypto protocol (SICS) in
> SCN'04 [available off my site],

And your site is? 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     To5/mH1p3iCBlpaC6McgYo2aehoFMV42OcrSW6Ze
     4AmE3tC68Tiyw+VQHexWjeQmXnrDHI+41ty416j11



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post