On Monday, February 17, 2003, at 01:17 AM, Ron Risley wrote:

At 7:36 +0100 2/13/2003, Frode Skarstein opined:
Does anyone else have any other ideas on how SMTP traffic could be intercepted as described earlier?

I agree with the other posters, though, that the technical feasibility of it is irrelevant. If this guy's paranoid, no amount of rational argument is going to change his beliefs. If he's just lying, he's just going to keep on lying.
Well, i am not arguing with him at all. His domain is being transferred as we speak. I'm trying to figure out, legally, what his case for claiming that I have tampered with his outgoing mail is. But i guess the situation is that I can show emails (and logs of his activity to do so) he's sent to me and others (on the same matter), and he has deleted his outgoing email. That is bad in his direction. He claims i have tampered with his emails. He has nothing to document this claim. I guess if anything, he'll fall, alternatively they'll just drop the case or something.

I get a GPG signature on my log files once a week, then have the signature timestamped by an independent third party:

http://www.itconsult.co.uk/stamper.htm

I then burn the logs, signature, and timestamp to a CD. It gives you a way to prove that the logs haven't been altered. It might be too late for you now, but then again it couldn't hurt
That is very good. i'll definately think of something like that.

Frode


#############################################################
This message is sent to you because you are subscribed to
 the mailing list <[EMAIL PROTECTED]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to  <[EMAIL PROTECTED]>

Reply via email to