[147771] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Mail Lists In the Post-Snowden Era

daemon@ATHENA.MIT.EDU (Devin Reade)
Mon Oct 21 09:25:59 2013

X-Original-To: cryptography@metzdowd.com
Date: Mon, 21 Oct 2013 04:39:25 -0600
From: Devin Reade <gdr@gno.org>
To: "cryptography@metzdowd.com List" <cryptography@metzdowd.com>
In-Reply-To: <B8751F45-4115-45A5-A6EA-F13AFA3681CE@lrw.com>
X-GNO-MailScanner-From: gdr@gno.org
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

At the risk of stating the obvious, going to an anonymized list
is not without its own problems.  One big part of the usability of
many mailing lists involves the reputation of the poster.  Take
this list for example:  I am not a cryptographer (I'm a software
architect and developer).  I've found the conversations on this
list interesting and it gives me things to think about in the
design and implementations of my own systems (and those of my
clients).

So what's the difference between this list and some arbitrary
list full of crackpots?  Here, if there is an argument that I
can't quite follow in sufficient detail to satisfy myself, one
option is to examine other sources with respect to the posters
and the topics at hand, and how they are considered by other
publicly-known cryptographers.  It's not the the best, but it
helps.

An analog exists, at least to some extent, on other mailing
lists.

As an aside, on a public list or bulletin board (anonymous or not)
I would be surprised if there is not software in existence that
could correlate poster's mannerisms against publicly available
non-anonymized postings to in effect de-anonymize the supposedly
anonymous postings with a reasonable degree of accuracy.

Devin


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post