[146384] in cryptography@c2.net mail archive
Re: [Cryptography] Good private email
daemon@ATHENA.MIT.EDU (Jerry Leichter)
Mon Aug 26 14:33:51 2013
X-Original-To: cryptography@metzdowd.com
From: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <521B8D59.9040302@sonic.net>
Date: Mon, 26 Aug 2013 13:39:36 -0400
To: Ray Dillinger <bear@sonic.net>
Cc: cryptography@metzdowd.com, Richard Salz <rich.salz@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On Aug 26, 2013, at 1:16 PM, Ray Dillinger <bear@sonic.net> wrote:
Minor point in an otherwise interesting message:
> Even a tiny one-percent-of-a-penny payment
> that is negligible between established correspondents or even on most email
> lists would break a spammer. Also, you can set your client to automatically
> return the payment (when you read a message and don't mark it as spam) or
> just leave it as a balance that you'll return when you reply.
This (and variants, like a direct proof-of-work requirement) has been proposed time and again in the past. It's never worked, and it can't work, because the spammers don't use their own identities or infrastructure - they use botnets. They don't care what it costs (in work or dollars or Bitcoins) to send their message, because they aren't going to pay it - the machine they've taken over is going to pay.
Granted, today most machines don't provide access to Bitcoins. But assuming your idea catches on, they will. Once a box has a legitimate capability to send some form of mail, it can be subverted to send mail of that form that the owner of that box didn't intend. As long as endpoints can be "pwned", nothing about those endpoints can be trusted....
-- Jerry
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography