[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: "censorship in cyberspace"???
Simple enough to solve:
1. all E-mail messages must be crypto-signed by the author's private key.
2. the list exploder verifies the key against the list membership, and only
forwards the message to the distribution list if the signature matches a
member of the list.
3. New members are added through invitation or introduction (hand wave).
Q.E.D.
There are, of course, some technology integration and ease-of-use issues
here, given that no commonly used commercial E-mail software will do #1.
Erik