-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

   ***^\     ."_)~~
 ~( __ _"o   Was Thu, 2 Sep 2004, at 10:26:40 +1000,
   @  @      when Robin Anson wrote:

> the only benefit of 2.12 (as I recall) is to show smileys that I think
> are a waste of time and effort and sender's photos in the header that
> are mildly interesting but hardly essential.

Just some irrelevant musings of mine in regard to the smiley thing...
For me, the technics/smiley "machine" is interesting: you can call by
"handle" some graphics dwelling locally on a reader's machine and you
don't need at all to use any "official" "smiley" coming in official
package at all. You can use *any* other handles and any other
pictures/"smileys" you like; and which are not listed and known publicly
at all. (-:

So you can create any number of a "custom" schemes and pictures related
to a specific correspondent you exchange letters with. Result can be
very pretty - you don't want to use any other format except a plain text
to have a picture shown in the "body" of it. Example: If you play, or
just learn and analyze, chess, then a picture of a chess table can be
loaded in a proper place - just in the middle of a plain text! You hence
do not need any paunchy HTML or RTF format to "embed" the picture in.
(-: And, you can in the same time use any convenient "features" of TB
(folders, filters, searching machine...) for organizing/archiving such a
mail. There. (:

Whatever creator(s) of the "smiley machine" had in mind initially, this
mechanism obviously can be implemented in much more useful, and
tempered, way. (-:

Appendix (the one on the right of bladder): you can also implement
something similar with "rogue header", that is with the "system" which
shows "sender's picture": you and some specific sender/"sendress" may
apply a local system of rogue headers which will show adequate pictures
(therefore not only *one* of them), and will carry a defined "message"
"under cover". It's good if someone is reading your mail, over your
shoulder or else, or else in general. This way this mechanism becomes a
means for "secret messaging" as well. You can also classify various
"types" of such messages just by searching for adequate "rogue headers",
apply a given filtering, "automatic answering" etc.

It's nice. (-:

Ah, an example: you and correspondent have a "system" of several "rogue"
pictures and headers. Let's say that all the pictures are identical,
except some tiny details coming from a slight editing of the pictures;
in one of them you will have a small bug on your neck, on another one
the bug will be on your ear, etc. The position of the bug will carry
some "message": "bug on neck" = "I do not mean it seriously, I just am
teasing and testing possible eavesdroppers"; "bug on ear" = "Come at six
at Ruffus' to tell you some details about this letter" - etc.

Isn't that nice, and *really* funny? (-:

Now I go to milk my cow.















































Kidding. (: Going to buy some milk. Mica hungry. Musings spend calories.

- --
Mica
PGP key uploaded at: <http://pgp.mit.edu/> once just before breakfast
-----BEGIN PGP SIGNATURE-----

iD8DBQFBNxpv9q62QPd3XuIRAoVjAJ46/gKyVEOwU69mFjjlarz3jVdobwCdFps6
avdHj7bJKJHSRi8PVfcYFAo=
=ffGy
-----END PGP SIGNATURE-----


________________________________________________
Current version is 3.00.00 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to