RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Ola Bini
At 17:43 2005-04-29, you wrote:
Eh...for email you may have a point, but I'm not 100% convinced. In other 
words, say they want to monitor your email account. Do you really believe 
they are going to tap all major nodes and then filter all the traffic just 
to get your email? ...
Well, they could just tune in on Echelon, which really seems to be reality. 
There is no need for infinite resources to do such a thing.

This is that whole, The TLAs are infinitely powerful so you might as well 
do nothing philosophy. And even though I might be willing to concede that 
they get all that traffic, one hand doesn't always talk to the other. 
there may be smaller branches on fishing trips accessing your email if 
they want. if one were able to monitor the email account for access, 
you'll at least force your TLA phisher into going through proper internal 
channels. He might actually get a no, depending on the cost vs risk.
Here is the fundamental misunderstanding. Your email is no account. There 
are no place where your account is stored. The only thing that exists is an 
endpoint, where you receive your mail. Before the mail reaches that point, 
its's just TCP-packets on the wire. If the listener is on a mail router, 
you could possibly see a trace of it in the message header, but it's 
possible to rewrite that stuff to, so the only way to KNOW if someone reads 
your mail is to analyze the potential readers behaviour based on the 
information in your mail.

/O



RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Ola Bini
At 16:10 2005-05-02, you wrote:

Here is the fundamental misunderstanding. Your email is no account. 
There are no place where your account is stored. The only thing that 
exists is an endpoint, where you receive your mail. Before the mail 
reaches that point, its's just TCP-packets on the wire.
OK, what the heck are you talking about? You're telling me that 
hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated 
campaign of disinformation would attempt to get that across. Are you like 
a 14-year-old boy or something?
That's completely unwarranted for. The end point for hotmail is Microsoft's 
hotmail-servers, and for gmail the endpoint is Google's servers. Stop being 
so damned rabid.

/O



RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Ola Bini
At 17:43 2005-04-29, you wrote:
Eh...for email you may have a point, but I'm not 100% convinced. In other 
words, say they want to monitor your email account. Do you really believe 
they are going to tap all major nodes and then filter all the traffic just 
to get your email? ...
Well, they could just tune in on Echelon, which really seems to be reality. 
There is no need for infinite resources to do such a thing.

This is that whole, The TLAs are infinitely powerful so you might as well 
do nothing philosophy. And even though I might be willing to concede that 
they get all that traffic, one hand doesn't always talk to the other. 
there may be smaller branches on fishing trips accessing your email if 
they want. if one were able to monitor the email account for access, 
you'll at least force your TLA phisher into going through proper internal 
channels. He might actually get a no, depending on the cost vs risk.
Here is the fundamental misunderstanding. Your email is no account. There 
are no place where your account is stored. The only thing that exists is an 
endpoint, where you receive your mail. Before the mail reaches that point, 
its's just TCP-packets on the wire. If the listener is on a mail router, 
you could possibly see a trace of it in the message header, but it's 
possible to rewrite that stuff to, so the only way to KNOW if someone reads 
your mail is to analyze the potential readers behaviour based on the 
information in your mail.

/O



Re: Email Certification?

2005-04-28 Thread Ola Bini
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
A
Can anyone figure out a way to determine if one's hotmail, etc...has 
been 
looked at or not?
Hi.
Email is more or less like sending a post card. Anyone inbetween can 
take a 
peek if they have the knowledge. (And not much knowledge is required). 
This 
is why cryptgraphic signing and encryption is preferable to 
communicate 
through EMail. So the answer to your question is: Always assume 
someone has 
looked at it.

Regards
 Ola
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (MingW32)
iD8DBQFCcJgxGTAxXnkBC3IRAs6NAJ9EJi8RwMWHF//Z3lgQz/FZ+UkdbwCbBZT5
L0mjFCQ3x+SYRjD6uatzCvY=
=ef/B
-END PGP SIGNATURE-