On Sat, Apr 18, 2020 at 09:13:34PM -0500, Derek Martin wrote:
None of these are also compelling, partly because they all describe
shady behavior,
shadyness lies in the eye of the beholder.
They also require either full access to all of your e-mail, or to a
very specific set of messages that bookends the period of bad
behavior. That's not likely.
a significant part of my mail traffic is to public mailing lists, and
it's sometimes fairly high-volume. this is by far enough to do data
mining.
The Hot Lady example is also another example of what I described
before: it's irrelevant, because the message headers indicating the
message came from the same source are already enough to incriminate
you.
no, because you don't (or rather, shouldn't) know what is going on
behind my NAT.
In the case of actual criminal behavior, it's likely enough to justify
a search warrant
that's not really the threat model here.