I am sending you this invitation to combat spam, because it pisses me
off and this is an extention for firefox or Thunderbird Email client
that will authenticate/detect spam and phish attacks.  This will help
protect your privacy online and make sure you do not accidently click
on an email that will compromise your computer.

You dont have to sign up for anything, u can just use the extention
for firefox, u can grab that here http://www.messagelevel.com/firefox/
defcon

How Does Message Level Work?

Message Level is a patent pending email authentication technology that
creates query-able unique identifiers for each outbound email (a.k.a.
headers, signatures, tokens or stamps) and utilizes an automated
query-back to the "purported sender" or received email in order to
determine whether the email is in fact authentic. The latter occurs
automatically and requires no end-user actions, responses or
interpretations.

Although any unique identifier can be used, Message Level creates ID's
from unique elements of the outgoing messages themselves, which makes
it impossible to phish or attack a sending system as messages are only
query-able back against the authentic sending system, authorized third
party or central processor.

Thereby enabling Sending Systems to assume full control of email
purported to be coming from them to recipient systems (e.g. Phishing
email), which creates the ability to detect fraudulent activity as it
is actually occurring and deny delivery of fraudulent messages with no
false positives or the associated liability with incorrect delivery
denial.

By virtue of this query-back to the Sending System, Message Level also
creates the real-time ability to track and certify delivery of
messages sent to end-users - even to the last mile of delivery to
end-user desktops. Moreover, as malicious viruses, trojans and
security threats will inevitably attempt to mislead users at the
desktop level via middle-man and replay attacks, Message Level is the
only authentication methodology that can be implemented securely at
the desktop level because it is the only authentication methodology
that places the Sender in complete control over the authentication
transaction.

As such, Message Level creates a distributed environment that enables
Sending Systems to become their own Authentication and Reporting
Authorities. Thereby providing the foundation necessary for Corporate
Enterprises to conduct business critical communications electronically
via Commercial Grade Email.
Benefits of placing the Sender in Control over the Authentication Transaction:

    * Enables Security & Authentication Changes without affecting
Deliverability.
    * Eliminates False Positives and the Liability associated with
incorrect Delivery Denials.
    * Provides real-time Transactional Control and Visibility to
Sending Systems.
    * Detects and Prevents Middle-Man and Replay Attacks.
    * Real-time Phishing Detection, Prevention and Alert Systems.
    * Real-time Forensic Data Collection and Evidentiary Archives.
    * Real-time Certified Delivery and Message Tracking.
    * Can Secure as far as the Last Mile of Delivery to End-User Desktops.

Placing the Sender in Control
Although the need for Email Authentication is clear, it continues to
evolve in many directions and proposed solutions continue to introduce
larger problems. As additional layers of complexity are introduced,
new layers are needed to control and report on the system.

We initially saw PKI measures introduced to authenticate email
messages because of their ability to be cached on the recipient
system. However, due to the fact that they are susceptible to Replay
Attacks and their inability to enable real-time security changes
without affecting the delivery of messages, we are now seeing PKI
email authentication shifting to network queries for each message that
is received. For example, if an enterprise decides to revoke their PKI
key because of Replay attacks or schedule security changes, how does a
recipient system know for any given message whether or not it has the
most up-to-date key cached within it's system for comparison purposes?
As such, it will have to perform a key query for each message received
in order to be assured that it has the most up-to-date key; otherwise
it risks denying delivery of legitimate messages and/or allowing
replayed fraudulent messages to be delivered.

Moreover, due to the fact that false-positives continue to rise
because of recipient-based interpretation, we are also seeing the
introduction of "deliverability analysis" services, feedback loops and
forensic "honey-pot" services to enable enterprises "to see" and gain
visibility over what is happening to their messages. However, even
with the introduction of the latter services in order to provide
"real-time" data to an enterprises, network reports and queries are
required at the point of delivery of every email received.

Since so many network queries and calls are being proposed for
services that attempt to give the Sending System a measure of control
and visibility over what is occurring, the basic question becomes:

    "How many additional layers of complexity are going to continue to
be introduced, and result in increased false positive rates, before we
simply give back transactional control to the enterprise itself?"

Stop-gap measures will continue to be introduced to make up for the
fact that the Sender is simply not in control over it's own
transactions. Historically we have seen this same process repeated
from Credit Card transactions that switched from holograms to queries
directly back to the bank, to software licensing which switched from
encrypted keys to queries back to the vendor itself and we will see it
with email authentication as well.

In essence, we will see the Enterprise switch from a model in which it
needs multiple vendors performing middle-man functions to one in which
the Enterprise becomes it's own Authentication Authority. Thereby
giving the Enterprise complete control, security and visibility over
its own transactions.

-- 
Gutsy Gibbon 2.6.22-9-generic Kernel Panic when inserting belkins F5D7050 USB 
wifi card/rt73 driver
https://bugs.launchpad.net/bugs/130078
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to