Penguin

Differences between version 6 and predecessor to the previous major change of WhySignEmail.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 6 Last edited on Monday, August 25, 2003 4:16:15 pm by JohnMcPherson Revert
Older page: version 3 Last edited on Wednesday, September 18, 2002 11:05:46 am by CraigBox Revert
@@ -11,7 +11,13 @@
  
 !Setting a pattern 
 If you have never signed an email in your life and someone forges an email from you containing important information (eg: "I am going to officially resign from my place of work"), then you can't argue that "if it was important then I would have sent it encrypted/signed! It obviously wasn't from me!" 
  
-!!Why not sign email 
+!!Spam  
+Any email that is encrypted (that you can decrypt of course...) is unlikely to be spam -- spending time encrypting the same message for millions of recipients costs the sender far too much in CPU time. Any encrypted email is obviously important and personal.  
  
-Cos you don 't really care . ;
+You can also use the web of trust as a way of figuring out who spammers are. If the email you recieved is signed by someone in your web of trust then they are unlikely to be a spammer. If it turns out that they are you can set their level of trust to "none" and perhaps lower the amount of trust of everyone who signed their key. A spammer will have a hard time finding people to sign their new key every time they want to send another email.  
+  
+!Viruses  
+Even if you run a better OperatingSystem, viruses that use email to propagate typically send themselves to random recipients with a fake "From" header. As above, if you have a history of signing your email, it is easier to convince other people that you didn 't send them a particular email . (The Sobig family of viruses have been very successful at propagating using email ).  
+----  
+Part of CategorySecurity