My view - as controversial as ever - is that the problem
is unfixable, and mail will eventually fade away. That
which will take its place is p2p / IM / chat / SMS based.
Which are easier to spam and less secure than smtp.
SMTP is p2p by definition, though you can use servers if you want.
SMS
--- begin forwarded text
Date: Wed, 2 Mar 2005 23:20:58 -0600 (CST)
From: Andrew Odlyzko [EMAIL PROTECTED]
To: Andrew Odlyzko [EMAIL PROTECTED]
Subject: FYI: paper about Metcalfe's Law
Dear Colleagues,
Sorry for the spam, but I thought you might be interested in the
paper described below.
Title: Reinventing Enterprise Learning
Reinventing Enterprise Learning E-Learning Return On Investment (ROI) Web Seminar SeriesDear subscriber,One of the greatest challenges in achieving and sustaining the vision of enterprise learning is not to have individuals working expeditiously
-- Error description:
Error-For: NET-HAPPENINGS@LISTSERV.CLASSROOM.COM
Error-Code: 3
Error-Text: No such list.
Error-End: One error reported.
On Thu, 24 Feb 2005, Peter Gutmann wrote:
(Either this is a really bad idea or the details have been mangled by the
Register).
No, it's just a really bad idea. A small group of us looked at this a few
weeks ago when it was announced, and while none of us are professional
cryptographers, we
On 2005-03-03T11:52:59+, ken wrote:
Chat is already higher volume (I read somewhere) in
raw quantity of messages sent than email.
I suspect you don't get much traffic. The beauty of a
non-real-time store-and-forward system like smtp (or SMS, or
oldstyle conferencing systems with
http://www.sfbg.com/39/22/cover_fcc.html
San Francisco Bay Guardian News
THE SAN FRANCISCO BAY
Mar. 2 - Mar. 8, 2005* Vol. 39, No. 22
Build your TV!
As the FCC and the entertainment biz get ready to end home recording as we
know it, a bunch of radical geeks are working on a solution or two.
| Briefly, it works like this: point A transmits an encrypted message to point
| B. Point B can decrypt this, if it knows the password. The decrypted text is
| then sent back to point A, which can verify the decryption, and confirm that
| point B really does know point A's password. Point A then
http://www.nytimes.com/2005/03/03/technology/circuits/03next.html?8cir=pagewanted=printposition=
The New York Times
March 3, 2005
WHAT'S NEXT
With Terror in Mind, a Formulaic Way to Parse Sentences
By NOAH SHACHTMAN
MAYBE sixth-grade English was more helpful than you thought. One of the
--- begin forwarded text
To: R.A.Hettinga [EMAIL PROTECTED]
From: Peter Wayner [EMAIL PROTECTED]
Subject: bounty for errors in _Translucent Databases_
Date: Thu, 3 Mar 2005 16:05:44 -0500
To: All readers of Translucent Databases.
I'm starting work on the second edition of _Translucent
The description has virtually nothing to do with the actual algorithm
proposed. Follow the link in the article - http://www.stealth-attacks.info/ -
for an actual - if informal - description.
There is no actual description publically available (there are three
completely different protocols
I haven't read the original paper, and I have a great deal of
respect for Markus Jakobsson. However, techniques that establish
that the parties share a weak secret without leaking that secret
have been around for years -- Bellovin and Merritt's DH-EKE,
David Jablon's SPEKE. And they don't require
http://news.com.com/2102-1028_3-5597079.html?tag=st.util.print
CNET News
http://www.news.com/
The coming crackdown on blogging
By Declan McCullagh
Story last modified Thu Mar 03 04:00:00 PST 2005
Bradley Smith says that the freewheeling days of political blogging and
online
My view - as controversial as ever - is that the problem
is unfixable, and mail will eventually fade away. That
which will take its place is p2p / IM / chat / SMS based.
Which are easier to spam and less secure than smtp.
SMTP is p2p by definition, though you can use servers if you want.
SMS
On 2005-03-03T11:52:59+, ken wrote:
Chat is already higher volume (I read somewhere) in
raw quantity of messages sent than email.
I suspect you don't get much traffic. The beauty of a
non-real-time store-and-forward system like smtp (or SMS, or
oldstyle conferencing systems with
On Thu, 24 Feb 2005, Peter Gutmann wrote:
(Either this is a really bad idea or the details have been mangled by the
Register).
No, it's just a really bad idea. A small group of us looked at this a few
weeks ago when it was announced, and while none of us are professional
cryptographers, we
The description has virtually nothing to do with the actual algorithm
proposed. Follow the link in the article - http://www.stealth-attacks.info/ -
for an actual - if informal - description.
There is no actual description publically available (there are three
completely different protocols
| Briefly, it works like this: point A transmits an encrypted message to point
| B. Point B can decrypt this, if it knows the password. The decrypted text is
| then sent back to point A, which can verify the decryption, and confirm that
| point B really does know point A's password. Point A then
18 matches
Mail list logo