From: ichudov@algebra.com (Igor Chudov @ home)
To: cypherpunks@toad.com
Message Hash: 16ba94f04dd749f8af9d2a56c69b4d95fdfebdbf3e9a02c2254b5c76958881ec
Message ID: <199611250134.TAA23699@manifold.algebra.com>
Reply To: N/A
UTC Datetime: 1996-11-25 01:36:57 UTC
Raw Date: Sun, 24 Nov 1996 17:36:57 -0800 (PST)
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sun, 24 Nov 1996 17:36:57 -0800 (PST)
To: cypherpunks@toad.com
Subject: kickouts done the Cypherpunks way...
Message-ID: <199611250134.TAA23699@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text
Hi,
Suppose Mr. X, owner of foobarpunks mailing list, wants to kick out Mr. Y,
for his obnoxious letters to the mailing list.
Mr. X, however, is concerned that Mr. Y would subscribe through some
proxy address and would continue replying to messages to foobarpunks.
It is assumed that the only person out of the whole universe, Mr. Y,
cannot be trusted. The problem is that X does not know which of the
subscribers is Mr. Y.
The question is, is there a technical way to disable Mr. Y from
reading the list, or detect which subscription address is a proxy for Y?
If we assume that, at the moment when Y was kicked out, he was not
subscribed through any other addresses, the solution becomes simple:
for any new subscription request we require a letter of recommendation
from some other subscriber. Since other subscribers are presumed to
be trustworthy, their recommendations would be sufficient. It is
actually being done in some of the mailing lists.
The problem becomes more complex when Mr. Y is already presumed to have
infiltrated the mailing list, possibly through several proxy addresses.
Is there any way to detect/find which if the subscriber is Y? One of
the simple-minded solutions is to _mutate_ mailing list messages
so that all readers get slightly different copies of mailing list messages
for each recipient. (Such mutations may include common misspellings,
inserting spaces, etc)
If the mailing list bot keeps track of what changes were made in
messages to which individual, and if we assume that Mr. Y has to quote
significant parts of messages he replies to, finally the variations
in messages may be reconciled with variations in quoted parts.
Mr. Y is not stupid, and may go as far as comparing letters, received
through different proxy addresses, in order to detect "variations"
and avoid quoting them.
The question is, is there a strategy of making variations and detecting
them in quotes to finally catch Mr. Y?
- Igor.
Return to November 1996
Return to “Moroni <moroni@scranton.com>”