At 06:38 PM 06/22/2002 -0400, Steve Fulton wrote:
>At 17:37 22/06/2002 -0400, [EMAIL PROTECTED] wrote:
>
>>Not arguing, but the hardware cost curve for storage has a shorter
>>halving time than the cost curve for CPU (Moore's Law) and the
>>corresponding halving time for bandwidth is shorter still
I tried sending this last week, but it did not seem to go through:
Two points:
1. According to Poulson, the DOJ proposal never
discussed just what would be logged. Poulson
compared it to the European Big Brother legislation,
which required storage to Web browsing
histories and email header d
On Sat, 22 Jun 2002, Lucky Green wrote:
> I am limiting relaying on port 25 smtp to authorized users by using
> Cyrus-SASL, which integrates cleanly with postfix + TLS as the MTA.
> Since Outlook only provides the plaintext variant of SASL
> authentication, my MTA is configured to not offer smtp
John Young wrote:
> I appreciate what an honorable ISP admin will do to abide
> customer rights over intrusive snoopers and perhaps
> cooperative administrators above the pay grade of a sysadmin.
> Know that a decent sysadmin is on
> for about 1/3 of a weekday for 24x7 systems is a small
> co
I appreciate what an honorable ISP admin will do to abide customer
rights over intrusive snoopers and perhaps cooperative administrators
above the pay grade of a sysadmin. Know that a decent sysadmin is on
for about 1/3 of a weekday for 24x7 systems is a small comfort but
leaves unanswered what c
At 17:37 22/06/2002 -0400, [EMAIL PROTECTED] wrote:
>Not arguing, but the hardware cost curve for storage has a shorter
>halving time than the cost curve for CPU (Moore's Law) and the
>corresponding halving time for bandwidth is shorter still.
You've got a point. Storage is becoming less and le
Steve,
Not arguing, but the hardware cost curve for storage has a shorter
halving time than the cost curve for CPU (Moore's Law) and the
corresponding halving time for bandwidth is shorter still.
If that relationship holds up over a period of years, today's
tradeoffs between cache, re-computatio
On Fri, Jun 21, 2002 at 02:56:10PM -0700, Lucky Green wrote:
> Locate the button in your MUA that's labeled "Use secure connection" or
> something to that effect, search the docs for your MTA for the words
> "STARTTLS", "relaying", and potentially "SASL", don't use your ISP's
> smtp server, encour
At 18:57 21/06/2002 -0700, John Young wrote:
>Data retention is being done now by programs and services
>which cache data to ease loading on servers and networks.
>[...]
John,
As a systems administrator @ an ISP, I can tell flat out that the software
you describe has nothing to do with ISP ser
John wrote quoting Lucky:
> > Locate the button in your MUA that's labeled "Use secure
> connection"
> > or something to that effect, search the docs for your MTA for the
> > words "STARTTLS", "relaying", and potentially "SASL", don't
> use your
> > ISP's smtp server, encourage those that you
Data retention is being done now by programs and services
which cache data to ease loading on servers and networks.
No approval needed from anybody, indeed, the service is
being offered as a cost saver and expeditor of net services
to ISPs and anybody else who might be eager to get around
restric
ji wrote:
> Under this proposed law, will ISPs have to scan *all* SMTP
> traffic and record the envelope, or only the traffic for
> which they actually do
> SMTP forwarding? If the latter is the case, we can simply go
> back to the original end-to-end SMTP delivery model; no
> POP/IMAP or an
ursday, June 20, 2002 10:57 AM
> To: [EMAIL PROTECTED]
> Cc: '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]'
> Subject: Re: DOJ proposes US data-rentention law.
>
> Trei, Peter wrote:
> > - start quote -
> >
> > Cyber Security Plan Cont
Under this proposed law, will ISPs have to scan *all* SMTP traffic and
record the envelope, or only the traffic for which they actually do
SMTP forwarding? If the latter is the case, we can simply go back to
the original end-to-end SMTP delivery model; no POP/IMAP or any of
that stuff. If the f
In message <[EMAIL PROTECTED]>, "David G. Koontz" writes:
>Trei, Peter wrote:
>> - start quote -
>>
>> Cyber Security Plan Contemplates U.S. Data Retention Law
>> http://online.securityfocus.com/news/486
>>
>> Internet service providers may be forced into wholesale spying
>> on their customers
Trei, Peter wrote:
> - start quote -
>
> Cyber Security Plan Contemplates U.S. Data Retention Law
> http://online.securityfocus.com/news/486
>
> Internet service providers may be forced into wholesale spying
> on their customers as part of the White House's strategy for
> securing cyberspace.
16 matches
Mail list logo