On Feb 20, 2008, at 1:00 PM, Paul Kyzivat wrote:
>
>
> I could potentially operate an anonymization service simply by  
> getting two PSTN phones. If you want my service, you call me on one  
> of my lines and tell me who you want to call. I call that number  
> with my other line, and just hold the receivers together to couple  
> the media.
>
> The recipient will get the callerid of my 2nd line. You can serve me  
> with a court order to provide the actual identity of the caller, but  
> it won't do any good because I don't know who that was.
>
> Further, I am not identity provider. My telco provider is the  
> identity provider for the line. A court order to them also will  
> serve no purpose.

Some would argue that you could be held culpable due to aiding and  
abetting. What happens if someone uses the open access point at your  
house to send threatening messages to the white house? What happened  
to the folks who ran the anonymous remailer service in Finland a while  
back? (see http://en.wikipedia.org/wiki/Penet_remailer)

> I don't *think* anybody is violating any laws here.

Laws vary. But we're I thought we were talking about another  
situation, see below.

>
>
> I see a sip anonymization service as being logically equivalent to  
> the above.
>

I didn't say you couldn't have a SIP anonymization service.  I'm  
saying that if you're running an identity service that inserting an  
identity header asserting that you know who the message is from when  
you don't actually know who the message is from  is a bad idea.

Conversely, there is a legitimate role for a service that is both an  
anonymizer and an asserter of identity. The assertion here is "I know  
who this person is, but I'm not telling you without proper cause". As  
an end user, I'd be inclined to grant this a higher level of trust  
than I would a message that claims nothing about who it might be from.

--
Dean

_______________________________________________
Sip mailing list  http://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to