On Sat, Sep 6, 2014 at 9:16 AM, Eliot Lear <[email protected]> wrote: > Hi Stephen, > > While I think it would be fun to talk with the gentleman about his bitcoin > thinking, the key part that I intended for this group was the situational > analysis involving spam and how bad guys behave.
Well spam prevention is where a lot of the proof of work stuff got its start. I don't have an implementation for this yet but this is my strategy * An endy-key is a key that is held by an end user at their device. * All mail is encrypted at the message layer when possible but not all mail is encrypted under an endy-key. * Domains may publish keys for use where an endy-key is not available or use is not authorized. * Use of an endy-key has to be specifically authorized. This is because (1) I have to read my mail on every device I use and that isn't practical till I can install decryption keys easily and (2) to enable abuse filtering. * The only normal user interaction here would be identifying mail as spam. * Users with really extreme privacy concerns like Greenwald/Snowden might exchange per user endykeys but this would be the exception, not the rule. _______________________________________________ Endymail mailing list [email protected] https://www.ietf.org/mailman/listinfo/endymail
