RSA or DSA keylength as an anti-spam feature
2014-667rhzu3dc-lists-groups at riseup.net
Wed Jul 2 05:32:34 CEST 2014
-----BEGIN PGP SIGNED MESSAGE-----
On Wednesday 2 July 2014 at 2:26:07 AM, in
<mid:53B35FAF.9060008 at jerome.cc>, Jérôme Pinguet wrote:
> OpenPGP as a kind of HashCash / proof of work solution
> to spam?
> If this proposition makes sense, that would open the
> way for a huge increase in user base! :-)
Mail encryption is vastly superior to HashCash, in my opinion, since
it protects the message content rather than merely wasting CPU effort.
> I'm thinking about automatically sending a reply (Wanna
> contact me? Install GPG or use my https://encrypt.to
> OpenPGP.js contact form...) then deleting unencrypted
> emails, at the MUA level. Does this make sense?
Depends on context. One of the banks I use eschews all email contact
but has a contact form on their "secure" website. But generally
speaking, auto-replies of the type "you sent an email to
<user at example.com>, please click this link or reply to this
message..." result in my not bothering, and potentially doing business
with somebody who is easier to contact.
By the way, I tried to send a test message to myself from
<https://encrypt.to> but was thwarted by its assumption that the email
address for message delivery would be found in the recipient's key,
which mine is not. I then sent myself a test message encrypted to a
revoked key, so I guess either Encrypt.to or OpenPGP.js needs a bit
MFPA mailto:2014-667rhzu3dc-lists-groups at riseup.net
Learning without thought is naught;
thought without learning is dangerous.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
More information about the Gnupg-users