Given such solutions, frameworks like what TCG is chartered to build are
in fact good and useful. I don't think it's right to blame the tool (or
the implementation details of a particular instance of a particular kind
of tool) for the idiot carpenter.
Given the charter of TCG, to produce DRM
On Fri, Jan 30, 2009 at 03:37:22PM -0800, Taral wrote:
On Fri, Jan 30, 2009 at 1:41 PM, Jonathan Thornburg
jth...@astro.indiana.edu wrote:
For open-source software encryption (be it swap-space, file-system,
and/or full-disk), the answer is yes: I can assess the developers'
reputations, I
On Fri, Jan 30, 2009 at 04:08:07PM -0800, John Gilmore wrote:
The theory that we should build good and useful tools capable of
monopoly and totalitarianism, but use social mechanisms to prevent
them from being used for that purpose, strikes me as naive.
Okay. In that case, please, explain
At 10:40 AM 1/30/2009, Thomas Coppi wrote:
Just out of curiosity, does anyone happen to know of any documented
examples of a botnet being used for something more interesting than
just sending spam or DDoS?
There are good botnets and bad botnets.
Good ones ask you if you want to join, bad ones
John Levine writes:
http://www.taugh.com/epostage.pdf
I would also point out that nothing is preventing anyone from
implementing their own epostage. Just send your email via a paypal
Send Money, accompanied with whatever postage you feel is appropriate.
No magic, no standards track epostage,
John Gilmore g...@toad.com writes:
The theory that we should build good and useful tools capable of monopoly
and totalitarianism, but use social mechanisms to prevent them from being
used for that purpose, strikes me as naive.
There's another problem with this theory and that's the practical
On Fri, Jan 30, 2009 at 01:47:23PM -0800, Ray Dillinger wrote:
Each time Fred gives out his email address to a new sender, he creates
a trust token for that sender. They must use it when they send him
mail.
That's basically what I'm using, just without the digital signature
part: each
On Fri, 30 Jan 2009 11:40:12 -0700
Thomas Coppi thisnuke...@gmail.com wrote:
On Wed, Jan 28, 2009 at 2:19 PM, John Levine jo...@iecc.com wrote:
Indeed. And don't forget that through the magic of botnets, the bad
guys have vastly more compute power available than the good guys.
Just out
That's basically what I'm using, just without the digital signature
part: each person/organisation/website/whatever gets a different email
address for communicating with me (qmail makes this easy to implement)
I do that too -- I bet half the people on this list do, and there's
lots of free and