On Wednesday, June 22, 2005, 5:52:05 PM, Ian A. White wrote:

> Ensuring e-mails are as the sender sent is is important, and it is
> only seen when there is a problem.

may be important, in some situations

> I was recently caught up in such a situation recently where a client
> refused to pay up and then denied ever sending an e-mail where he
> clearly stated he was not going to pay. He did not just send a message
> with the words "Not Paying", but he quoted back the entire message I
> had sent outlining what work I had done, the fact that he had accepted
> it and said there were no problems, and that he had subsequently asked
> me to do more work because there had been no problems.

> When the matter became legal, it was the fact that the messages he had
> sent me were as they were sent that resulted in a decision in my
> favour. Had I edited the messages I received in any way, the decision
> would not have gone in my favour.

The crux of the question was whether you had edited the messages, not
whether you had had the means to possibly have edited

> If you want to archive material, then it is important that the
> messages are as received disclaimers and all otherwise it is not an
> archive of the messages received, but an archive of extracts.

in some circumstances, depending on the reason which you are doing the
archiving and the use which you may put the archives to in the future.


> Depending on what the messages are, might not make this important, but
> an e-mail client should not permit editing messages as received and
> then continue to show them as received messages without any indication
> they have been changed.

By this logic, we should get rid of pens, because someday someone
might use one to commit a forgery. I cannot imagine that an issue of
the foundation of an email is ever going to come down to whether or
not one can prove that it is impossible to change the contents of any
message in that software. If it did, then the foundation would not be
any good for messages in TB! either, because whenever any ever
broaches this topic, someone explains how if one wants to edit
messages badly enough, and doesn't mind going the long route instead
of being able to do it conveniently, one can always export the message
to some other piece of software, make the changes and import it back.

If one wants to forge badly enough, one can find the tools. But if one
wants to be able to conveniently use software s/he has purchased, to
accomplish the tasks that person wants to accomplish to make the
data he uses that software to collect and use, that would be somehow
suspect because if some other evil doer wanted to use the same
software, evil could be done.


-- 
Dwight A. Corrin
928 S Broadway
Wichita KS 67211
316.303.1411  fax 316.265.7568
dcorrin at fastmail.fm
Using The Bat! 3.5.30 on Windows XP version 5,1


________________________________________________
Current version is 3.5.25 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to