--
On 30 Mar 2005 at 13:00, Amir Herzberg wrote:
A missing element is motivation for getting something
like this deployed... I think spam could offer such
motivation; and, I strongly believe that a
cryptographic protocol to penalize spammers could be
one of the most important tools
feedback...]
Best, Amir Herzberg
James A. Donald wrote:
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
* The user should automagically get
--
On 30 Mar 2005 at 13:00, Amir Herzberg wrote:
A missing element is motivation for getting something
like this deployed... I think spam could offer such
motivation;
Phishing is costing billions, and is a major obstacle to
electronic commerce. In my judgment, fixing phishing
and
At 07:00 PM 3/28/2005, James A. Donald wrote:
In my blog http://blog.jim.com/ I post how email encryption should work
I see a couple of problems with your proposal.
I'm not sure I like your external trusted mail-server assumptions,
but they're probably good enough for many people,
and other people
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
* The user should automagically get his certified
key when he sets up the email
Hi James,
I read that last night, and was still musing on it...
James A. Donald wrote:
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read