Keyserver spam example

MFPA expires2010 at ymail.com
Fri Jun 11 18:23:38 CEST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi


On Thursday 10 June 2010 at 4:53:43 PM, in
<mid:87bpbivq7s.fsf at servo.finestructure.net>, Jameson Rollins wrote:


> On Thu, 10 Jun 2010 11:32:05 -0400, Daniel Kahn Gillmor
> <dkg at fifthhorseman.net> wrote:
>> And i should probably add that it is indeed an infinitesimal drop in the
>> bucket compared to the other spam i receive; i'm not concerned about it.

> Not to mention that the bother of a couple of extra
> spams is completely dwarfed by the benefit of having
> the public keyserver network.

This is true, but it would be perfectly feasible to have a working
network of public keyservers that did not reveal email addresses. User
IDs could contain a hash of the email address. Applications querying
the keyservers could query for the hashed email address. Privacy would
be the main advantage to such a system; eliminating the possibility of
keyserver spam is a positive side-effect.

- --
Best regards

MFPA                    mailto:expires2010 at ymail.com

Can you imagine a world with no hypothetical situations?
-----BEGIN PGP SIGNATURE-----

iQCVAwUBTBJjEaipC46tDG5pAQqa8AQAk1AYt5BJlQ+WJFTz2aysR8SK6DbD0jjR
HkQVxuogazcvNFpeb/I8NH4HmC8LS6U+FTGEK2zc9e+lfwYaUiEwUaBlGj5rI9mN
jnW3Txo01I161mM0jQVKyLG3YFhv+GIUNCPFyhLyd8wO7rt6fUnDzX65Qjv06BS9
Cyz7lT37eOM=
=fJHN
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list