[15101] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [camram-spam] Re: Microsoft publicly announces Penny Black PoW

daemon@ATHENA.MIT.EDU (Alan Brown)
Tue Dec 30 10:21:37 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 30 Dec 2003 09:41:54 -0500 (EST)
From: Alan Brown <alanb@digistar.com>
To: camram-spam@camram.org
Cc: cypherpunks@minder.net, Adam Back <adam@cypherspace.org>,
	cryptography@metzdowd.com, cypherpunks@lne.com
In-Reply-To: <3FF184C2.9070002@harvee.org>

On Tue, 30 Dec 2003, Eric S. Johansson wrote:

>  But using your spam size, , the slowdown factor becomes roughly
> 73 times.  So they would need 73 machines running full tilt all the time
> to regain their old throughput.

Believe me, the professionals have enough 0wned machines that this is
trivial.

On the flipside, it means the machines are "burned" faster.

> unfortunately, I think you making some assumptions that are not fully
> warranted.  I will try to do some research and figure out the number of
> machines compromised.  The best No. I had seen to date was about 350,000.

It's at least an order of magnitude higher than this, possibly 2 orders,
thanks to rampaging worms with spamware installation payloads
compromising cablemodem- and adsl- connected Windows machines worldwide.

AB




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post