RE: zombied ypherpunks (Re: Email Certification?)
At 17:43 2005-04-29, you wrote: Eh...for email you may have a point, but I'm not 100% convinced. In other words, say they want to monitor your email account. Do you really believe they are going to tap all major nodes and then filter all the traffic just to get your email? ... Well, they could just tune in on Echelon, which really seems to be reality. There is no need for infinite resources to do such a thing. This is that whole, The TLAs are infinitely powerful so you might as well do nothing philosophy. And even though I might be willing to concede that they get all that traffic, one hand doesn't always talk to the other. there may be smaller branches on fishing trips accessing your email if they want. if one were able to monitor the email account for access, you'll at least force your TLA phisher into going through proper internal channels. He might actually get a no, depending on the cost vs risk. Here is the fundamental misunderstanding. Your email is no account. There are no place where your account is stored. The only thing that exists is an endpoint, where you receive your mail. Before the mail reaches that point, its's just TCP-packets on the wire. If the listener is on a mail router, you could possibly see a trace of it in the message header, but it's possible to rewrite that stuff to, so the only way to KNOW if someone reads your mail is to analyze the potential readers behaviour based on the information in your mail. /O
RE: zombied ypherpunks (Re: Email Certification?)
At 16:10 2005-05-02, you wrote: Here is the fundamental misunderstanding. Your email is no account. There are no place where your account is stored. The only thing that exists is an endpoint, where you receive your mail. Before the mail reaches that point, its's just TCP-packets on the wire. OK, what the heck are you talking about? You're telling me that hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated campaign of disinformation would attempt to get that across. Are you like a 14-year-old boy or something? That's completely unwarranted for. The end point for hotmail is Microsoft's hotmail-servers, and for gmail the endpoint is Google's servers. Stop being so damned rabid. /O
RE: zombied ypherpunks (Re: Email Certification?)
At 17:43 2005-04-29, you wrote: Eh...for email you may have a point, but I'm not 100% convinced. In other words, say they want to monitor your email account. Do you really believe they are going to tap all major nodes and then filter all the traffic just to get your email? ... Well, they could just tune in on Echelon, which really seems to be reality. There is no need for infinite resources to do such a thing. This is that whole, The TLAs are infinitely powerful so you might as well do nothing philosophy. And even though I might be willing to concede that they get all that traffic, one hand doesn't always talk to the other. there may be smaller branches on fishing trips accessing your email if they want. if one were able to monitor the email account for access, you'll at least force your TLA phisher into going through proper internal channels. He might actually get a no, depending on the cost vs risk. Here is the fundamental misunderstanding. Your email is no account. There are no place where your account is stored. The only thing that exists is an endpoint, where you receive your mail. Before the mail reaches that point, its's just TCP-packets on the wire. If the listener is on a mail router, you could possibly see a trace of it in the message header, but it's possible to rewrite that stuff to, so the only way to KNOW if someone reads your mail is to analyze the potential readers behaviour based on the information in your mail. /O
Re: Email Certification?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 A Can anyone figure out a way to determine if one's hotmail, etc...has been looked at or not? Hi. Email is more or less like sending a post card. Anyone inbetween can take a peek if they have the knowledge. (And not much knowledge is required). This is why cryptgraphic signing and encryption is preferable to communicate through EMail. So the answer to your question is: Always assume someone has looked at it. Regards Ola -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.1 (MingW32) iD8DBQFCcJgxGTAxXnkBC3IRAs6NAJ9EJi8RwMWHF//Z3lgQz/FZ+UkdbwCbBZT5 L0mjFCQ3x+SYRjD6uatzCvY= =ef/B -END PGP SIGNATURE-