How do I know if its encrypted?
James A. Donald
jamesd at netcom.com
Wed Jan 11 21:29:13 PST 1995
On Wed, 11 Jan 1995, Mark Oeltjenbruns wrote:
> (3) Peform a histogram analysis on it, if it doesn't pass a certain
> threshold reject the whole thing. Although cute, I don't like this one.
Why not -- sounds cool to me. It is also very fast, and does not
take much programming.
It will stop all cleartext. Probably some pictures would get through,
so it would not stop mailbombings, but a volume limitation per
apparent user and apparent destination would stop mailbombings.
A volume limitation sounds like a lot of work to program though.
---------------------------------------------------------------------
We have the right to defend ourselves and our
property, because of the kind of animals that we http://nw.com/jamesd/
are. True law derives from this right, not from James A. Donald
the arbitrary power of the omnipotent state. jamesd at netcom.com
More information about the cypherpunks-legacy
mailing list