RE: [Asrg] 2. Problem Characterization - Defining spam within consent paradigm

"Bob Wyman" <bob@wyman.us> Thu, 03 July 2003 16:58 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24574 for <asrg-archive@odin.ietf.org>; Thu, 3 Jul 2003 12:58:38 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y7PO-0007wP-C3 for asrg-archive@odin.ietf.org; Thu, 03 Jul 2003 12:58:10 -0400
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id h63GwAsX030520 for asrg-archive@odin.ietf.org; Thu, 3 Jul 2003 12:58:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y7PO-0007wB-8u for asrg-web-archive@optimus.ietf.org; Thu, 03 Jul 2003 12:58:10 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24563; Thu, 3 Jul 2003 12:58:07 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19Y7PM-0003CG-00; Thu, 03 Jul 2003 12:58:08 -0400
Received: from ietf.org ([132.151.1.19] helo=optimus.ietf.org) by ietf-mx with esmtp (Exim 4.12) id 19Y7PL-0003CD-00; Thu, 03 Jul 2003 12:58:07 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y7PF-0007tB-H1; Thu, 03 Jul 2003 12:58:01 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Y7P0-0007sh-Qh for asrg@optimus.ietf.org; Thu, 03 Jul 2003 12:57:46 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24558 for <asrg@ietf.org>; Thu, 3 Jul 2003 12:57:43 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19Y7Oz-0003C7-00 for asrg@ietf.org; Thu, 03 Jul 2003 12:57:45 -0400
Received: from vmmrnat.verisignmail.com ([216.168.230.187] helo=mr10.verisignmail.com) by ietf-mx with esmtp (Exim 4.12) id 19Y7Oy-0003C4-00 for asrg@ietf.org; Thu, 03 Jul 2003 12:57:44 -0400
Received: from ms3.verisignmail.com (ms3.verisignmail.com [216.168.230.176] (may be forged)) by mr10.verisignmail.com (Mirapoint Messaging Server MOS 3.2.2-GA) with ESMTP id ACH16071; Thu, 3 Jul 2003 12:57:38 -0400 (EDT)
Received: from BOBDEV (pool-162-83-223-223.ny5030.east.verizon.net [162.83.223.223]) by ms3.verisignmail.com (Mirapoint Messaging Server MOS 3.2.2-GA) with ESMTP id AKA04481; Thu, 3 Jul 2003 12:57:36 -0400 (EDT)
Reply-To: bob@wyman.us
From: Bob Wyman <bob@wyman.us>
To: 'Barry Shein' <bzs@world.std.com>, 'Yakov Shafranovich' <research@solidmatrix.com>
Cc: asrg@ietf.org
Subject: RE: [Asrg] 2. Problem Characterization - Defining spam within consent paradigm
Message-ID: <002001c34184$375769f0$640aa8c0@BOBDEV>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.4024
In-Reply-To: <16131.32702.114682.219965@world.std.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Importance: Normal
Content-Transfer-Encoding: quoted-printable
Sender: asrg-admin@ietf.org
Errors-To: asrg-admin@ietf.org
X-BeenThere: asrg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=unsubscribe>
List-Id: Anti-Spam Research Group - IRTF <asrg.ietf.org>
List-Post: <mailto:asrg@ietf.org>
List-Help: <mailto:asrg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/asrg>, <mailto:asrg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/asrg/>
Date: Thu, 03 Jul 2003 12:57:41 -0400
Content-Transfer-Encoding: quoted-printable
Content-Transfer-Encoding: quoted-printable

Barry Shein wrote:
> Although reasonable-sounding these descriptions [of consent] 
> are starting to remind me of those long-ago Artificial Intelligence 
> seminars where you'd get to ponder why some seemingly simple 
> human behavior was so difficult to code into a program. 
	We've had precisely the same issue with software licensing or
Digital Rights Management for years. The issue is one of managing
expectations. The reality is that machines can only manage things they
can detect yet people will often express their rules in terms that
involve things that machines can't detect. For instance, people will
often say that they only want mail from some specific user yet the
machine can't detect identity. The machine can only detect the use of
things which are assumed to indicate identity. (i.e. When if someone
says "Only Bob can send mail" what the machine needs to hear is "Only
someone using Bob's private key can send mail." For a person, "identity"
is an attribute of being. For the computer, identity is a property which
is assumed belong to users of certain proofs of identity. 
	But, this is all getting a bit philosophical. Barry has a point.
As we get into dealing with the issues of expressing and managing
consent, we must all be careful to ensure that people understand the
inherent limitations of machines in this realm. There is only so much
that the machine can do for you.

		bob wyman


_______________________________________________
Asrg mailing list
Asrg@ietf.org
https://www1.ietf.org/mailman/listinfo/asrg