Jamie,

<humour>

I can see a number of problems with your concept, though I concede
that
there is a burning need.

Spammers are unscrupulous and would somehow manage to get themselves
"signed" in any case.

Are you going to allow anyone to issue a CA or just the Verisign,
Thwaites, etc.

What will you do about unverified mail that is genuine.  It has to be an
"everyone in" environment otherwise it just won't work.

What if I am a cyberpariah and no one will sign my authentication, even
though I might have noble motives.  One name that appears on this list
occasionally (I think) springs to mind.

</humour>  (sorry, but I am fresh out of humour for the rest of the day)

-- 
Howard.
______________________________________________________
LANNet Computing Associates <http://www.lannet.com.au>

On Thu, 3 Aug 2000, Jamie Honan wrote:

> 
> Humour me.
> 
> I'm trying to work up some ideas, and I'm looking for feedback, 
> either more ideas or references to 'things I should look at'.
> 
> I'm taking my starting point the following: the pros and
> cons of widespread personal authentication on the internet.
> 
> With widespread authentication, it might be possible to reduce spam.
> Recipients might refuse email from non-authenticated senders.
> 
> There are other social benefits to authentication. Multiplayer
> games suffer when cheats exploit hard to close loopholes
> (http://www.gamasutra.com/features/20000724/pritchard_01.htm and
> http://slashdot.org/article.pl?sid=00/07/25/1448226)
> 
> When we are responsible for our actions (our guilt and our
> glory have a half life beyond a few hours) then we might
> take more care to act in a more long term manner.
> 
> (What penalties could be meted out? Banishment?)
> 
> Imagine not a single yes / no authentication but a multi layered,
> 'rings of authentication', something like what we use for social
> validation at the moment.
> 
> The PGP keyring signing suggests not signing someone else's key
> unless they are physically verified.
> 
> But what if we could have levels of verification. I know Jack,
> and Jack knows Judy, therefore I'll verify Judy as a suitable
> person to play backgammon with. A sort of 'rings of association'.
> Level 1 :- physically verified, through to level 3 :- friend
> of a friend.
> 
> But there could also be more formal methods. A bank could verify
> that Joe Bloggs is a valued customer of good standing.
> 
> How would such a system work? There are public pgp key servers
> http://www.pgp.net/pgpnet/pks-commands.html.
> 
> (How would an email recipient program use such public servers?
> I'm envisaging a system something like dns, where you
> could publically verify the sender, up to some level of trust).
> 
> I was imagining something like ldap. 
> 
> How would it be funded? Subscription? Perhaps each ISP could
> run one as part of their service?
> 
> Thanks in advance for any ideas you can add.
> Jamie
> 
> 
> 
> --
> SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
> More Info: http://slug.org.au/lists/listinfo/slug
> 



--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to