Differences between current version and previous revision of WhySignEmail.
Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 11 | Last edited on Sunday, August 29, 2004 7:02:12 am | by AristotlePagaltzis | |
Older page: | version 10 | Last edited on Sunday, August 29, 2004 7:00:32 am | by AristotlePagaltzis | Revert |
@@ -27,8 +27,8 @@
You can also use the web of trust as a way of figuring out who spammers are. If the email you recieved is signed by someone in your web of trust then they are unlikely to be a spammer. If it turns out that they are you can set their level of trust to "none" and perhaps lower the amount of trust of everyone who signed their key. A spammer will have a hard time finding people to sign their new key every time they want to send another email.
! Viruses
-Even if you run a better OperatingSystem, viruses that use email to propagate
typically send themselves to random recipients with a fake "
From"
header. As above
, if you have a history of signing your email, it is easier to convince other people that you didn't send them a particular email. (The Sobig family of viruses have been very successful at propagating using email).
+Email [Virus]es
typically send themselves to random recipients with a fake <tt>
From:</tt>
header, so yours will invariably be used even
if you run a better OperatingSystem. If
you have a history of signing your email, it is easier to convince other people that you didn't send them a particular email. (The Sobig family of viruses have been very successful at propagating using email).
----
Part of CategorySecurity