On Mon, Mar 13, 2023 at 03:35:20AM +0100, Vincent Lefevre wrote:
> On 2023-03-12 22:30:50 -0400, Jeffrey Walton wrote:
> > Security on a channel (like HTTPS) usually makes it tougher to inspect
> > traffic. Or at least it makes it tougher in HTTPS. In fact, spam
> > filters are mostly useless for messages encrypted with a tool like GPG
> > or GnuPG.
> 
> Are there spammers who send encrypted messages???
> This seems counterproductive.

It seems doable, but somewhat awkward. For a spammer to send me an
encrypted message, they would have to fetch my public key. This
would have to happen in an automated way (on spam, every millionth
of a cent counts). Doable, but given the population sice (and
arguably, type) I don't think it would add up.

Of course, TLS is a whole different kettle of fish. On the one hand,
it's just the /transport/ which is secured (so the systems [1] on
both sides know the plaintext and can run whatever Bayes they like
on it. On the other hand, spammers can just get a LetsEncrypt
cert for only the setup cost -- so just having a "valid certificate"
wouldn't count very much towards the trust chain. Having a valid
certificate tied to the DNS would count a bit more (yes, someone
might lose control of their DNS, but those events are statistically
more sparse).

[1] I consider browsers more like MTAs as whole systems. They are
   operating systems in their own right, with knowledge about your
   hardware, running other people's code on your box and a small
   fractal of window managers, GUI toolkits, virtual machine Rube
   Goldbergisms and all that. For better or worse. Worse, if you
   ask me.

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to