Joi makes a great point about the character of different spam control methods. While in the narrow sense, this is not an end-to-end issue (as Saltzer, Clark and Reed framed it), in a general sense, spam solutions can be divided into those that respect end-to-end values, and those that don’t. The label+bounty solution (which has a nice discussion on /. and which I’d lose my job over if it doesn’t work), I’m happy to acknowledge, is end-to-end respectful.
-
Archives
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- May 2011
- March 2011
- November 2010
- October 2010
- August 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005
- June 2005
- May 2005
- April 2005
- March 2005
- February 2005
- January 2005
- December 2004
- November 2004
- October 2004
- September 2004
- August 2004
- July 2004
- June 2004
- May 2004
- October 2003
- September 2003
- August 2003
- July 2003
- June 2003
- May 2003
- April 2003
- March 2003
- January 2003
- December 2002
- November 2002
- October 2002
- September 2002
- August 2002
-
Meta
I think it very much is an E2E issue.
If you imagine email being (as it is) a “network” with addresses, senders, receivers and the normal paraphenalia of a network (routers, etc.) then the question of location of the “spam-filtering” function should be guided by the E2E principle, ie, if a function can be performed at the end-points of the network, do it there.
Spam filtering can be done by individual users, thus E2E would recommend an end-point solution.
Latest statistic I’ve seen is that 11.7% of valid email is currently not delivered due to “ham-fisted” filtering outside of the control of the user. Certainly the user should be able to cede control of spam to another entity, but it should remain possible for them to do it themself, their way, part of the optionality value of such systems.
Spam is in the eye of the beholder, like a lot of things. The historical solution is centralised filtering, censorship for example, but as we move toward a future where decentralisation is an option, spam can be a “customer owned” problem, and solved collaboratively by multiple sets of like minded individuals.
In all these discussions about “spam” it’s worthwhile to substitute “porn,” “copyright material” or “criticism of the Government” as the subject, because it seems to me, the day you define and control “spam,” everything will be controllable with the same technology.
Our demonisation of spam might obscure the fact that it’s existence is part of the cost of participation in an untrammelled communication network.
Removing spam might cost us that.