What would we do...Trackbacks
Trackback specific URI for this entry
No Trackbacks
Comments
Display comments as
(Linear | Threaded)
Huh? No spammer with at least a little clue will use encryption because it's just too much work, IMHO. Of course, grabbing addresses from keyservers is easy. But the encryption would just take too long, again: IMHO. Just try encrypt a message several hundreds of thousands times. Even when encrypting to multiple recipients, it's still too slow.
Oh, and you can't abuse opened up windows machines via some worm or virus as hardly one of those has pgp/gpg installed. These would be more security aware people with likely fully patched systems harder to open up. The only problem IMHO is that you just can grab addresses from keyservers for ordinary spam. But spammers likely will find these addresses easier via other sources (web, usenet, etc.)
yes thats a problem too. i have not much clue about spamming practices and how much performance they have but remeber, the performance of computers is still increasing.
Add Comment
|
Calendar
QuicksearchSupportRecent Entries
CategoriesTag cloud23c3 acpi advertising annouce announce april argh art awards bash blogging bugs c cli code conferences config configuration data mining debconf debian dell dns documentation email errm? events exploit fail fail2ban filesharing films flame fun gcc google graphs grml gsm hacking hacks hardware heise images information installation internet irc knowledge libacpi links linux mobile phones network news newsbeuter omg open source opera passwords php power privacy programming qa random blurb rant release releases rss scripts security service setup shell sms software spam ssh stfl stuff terminal tests text mode tip tips tools troubleshooting unix user video vim.editing web web 2.0 websites wordpress wtf www youtube zsh
|