[OT] spam and virii ? - cryptographic authentication solution?

Jim Witte jswitte at bloomington.in.us
Sun May 26 02:47:01 EDT 2002


   First, a simple question:  lots of people have taken to putting the 
emails as 'jswitte at indiana dot EDUcation' or something like that.  
Could the runRev listserv automatically do this with people's email 
addresses?  (Or do the spam bots already know how to deal with that?)

   I haven't noticed any doing a cursory look at my folder (from Feb 
through May).  Here's an idea to combat this: could we set up a 
list-serv-based PGP system (or some kind of authentication system)?  I 
read a piece once that said that for all people complain about spam 
these days, it would either not be a problem, or be less of a problem, 
if the US Gov't had gotten it's head out of the sand about crypto back 
when Diffie and Hellman were doing there work: that if EVERYONE had a 
public/private key, then not only could everything be secure, but it 
could be authenticated as coming from someone in particular.

   (Of course, such a system shouldn't be a requirement, and the amount 
of information linked to the key should be absolutely minimal, and it 
probably shouldn't even be set up by the gov't - too many 
conspiracy-heads out there to trust, too much history of the gov't 
giving the conspiracy-heads reason to be skeptical, and it would be a 
logistical nightmare [though no more than the Clipper-chip fiasco would 
have been]  But I digress..)

   My complicated idea is that when a message is sent, the sender's email 
is hashed with the time-stamp of the the message and placed at the end.  
Find an algorithm that so that the hash-verification would not "fail" if 
the "inputted time" was within 3 minutes of the "real" time.  When a 
message is downloaded, the time-stamp and email are fed into the hash 
function, and the code is looked for at the bottom.  If it isn't there, 
it goes into a junk folder.

   My simple idea is just to have everyone add a specific character code 
to their signatures, which the listserv would look for, and if not 
present, would prepend "[POSSIBLE SPAM]" to the subject line.

   The second idea requires that people do something everytime they send 
a message (or modify their signatures), and spammers might eventualy 
catch on (but I would think that if a spammer is THAT determined to hit 
the RunRev demographic, they might not be considered spam..)  The 
problem with the first idea is that for it to really work it has to be 
transparent, which means writing a "send-plugin" on 4 or 5 or more 
different email clients (off the top of my head, Apple Mail, MS 
Entourage [Win/Mac], Eudora [Win/Mac/Newton], Emacs, Pine)  That would 
not be a small undertaking (nor do I know enough about writing plugins 
to do even some of it)..

   If you've gotten this far, thanks for listening to me ramble..

Jim

> is anyone else starting to receive "spam" from this list?
> i've also received a few unknown emails that contained the same virus..
> perhaps there could be a way to block out our email addresses so as not 
> to be a source for email "miners"? maybe have the email "From" the real 
> person but have the mailing lists email address instead?




More information about the use-livecode mailing list