Daniel J McDonald wrote:
> On Fri, 2009-10-16 at 16:25 -0400, Adam Katz wrote:
> 
>> My own proposal to fixing this is to bring back Blue Security's 
>> do-not-email list, which is to say a freely available index of
>> secure hashes representing email addresses that have opted out of
>> bulk email. (Recall that the controversial aspect of Blue
>> Security's methods is what they did to violators, which I'm not
>> touching here.)
> 
> The other problem with it is that it can be used to scrub lists and
> get a set of real users who don't want spam.  There is no guarantee
> that spammers will be ethical and remove the DNE recipients - they
> may find a better return throwing out the addresses that don't
> match...

You're thinking in terms of maliciousness and not profitability.  Yes, a
spammer can use the hash index to refine a list of known emails to just
people who *don't* want bulk mail ... but how does that help?

> And then there are hash collisions...

Not really.  They're too rare (and they don't really matter).  MD5 (the
/simplest/ checksum to consider) has a one in 2^128 chance of a
collision.  To put that in perspective, the Mega Millions lottery has
1:176M odds, aka one in 2^27.4 -- that's larger by a factor of a binary
googol (2^100).  (Note, the not-at-all applicable collision attack has a
complexity of 2^32.)

I'm not worried.  If the index is large enough to have ONE guaranteed
collision, it's either improperly maintained (and therefore rubbish) or
it's a victim of its own success and we no longer need it.

Reply via email to