On Sat, Sep 6, 2014 at 9:16 AM, Eliot Lear <[email protected]> wrote:
> Hi Stephen,
>
> While I think it would be fun to talk with the gentleman about his bitcoin
> thinking, the key part that I intended for this group was the situational
> analysis involving spam and how bad guys behave.

Well spam prevention is where a lot of the proof of work stuff got its start.


I don't have an implementation for this yet but this is my strategy

* An endy-key is a key that is held by an end user at their device.

* All mail is encrypted at the message layer when possible but not all
mail is encrypted under an endy-key.

* Domains may publish keys for use where an endy-key is not available
or use is not authorized.


* Use of an endy-key has to be specifically authorized. This is
because (1) I have to read my mail on every device I use and that
isn't practical till I can install decryption keys easily and (2) to
enable abuse filtering.

* The only normal user interaction here would be identifying mail as spam.

* Users with really extreme privacy concerns like Greenwald/Snowden
might exchange per user endykeys but this would be the exception, not
the rule.

_______________________________________________
Endymail mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/endymail

Reply via email to