Re: universal service, was Outsourcing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I may regret this, but a few very small observations...

--On Sunday, January 1, 2023 19:42 -0500 Phillip Hallam-Baker
<phill@xxxxxxxxxxxxxxx> wrote:

> On Sun, Jan 1, 2023 at 4:03 PM John R Levine <johnl@xxxxxxxxx>
> wrote:
> 
>> > The notion that anyone who knows my phone number is
>> > authorized to call me any time of the day or night is
>> > stupid on a stick. So is the notion
>> anyone
>> > who feels like it can clutter up my inbox.
>> 
>> I couldn't disagree more.  The reason e-mail survives and
>> none of the things that are supposed to be better and replace
>> it have done so is exactly because anyone can send e-mail to
>> anyone else.

> That doesn't mean anyone should be able to send me any sort of
> message of any length without permission, unsolicited and
> impersonate someone else as they do.
> 
> And being able to cause a bell to ring in my home because some
> telemarketing scum wants to sell something to me - No, just no.

To extend that analogy a bit, if some more traditional marketer,
of the "door-to-door salesperson" variety, comes to your home
and rings the doorbell, is that different on any level other
than frequency and scale?  Does that make them less scum?  Are
you protected from such people by keeping a fierce dog or pet
dragon whom you threaten to unleash as soon as they start up the
walkway?

Just trying to understand the boundaries and reasoning here.

>...
> If you want a walled garden, there's no shortage of them but I
>> have two observations.

> If you read to the end you will see that I am absolutely
> opposed to walled gardens.
> 
> Universal service does not mean having to forego access
> control.

But we make choices about that.  I use several email addresses.
They are, to a considerable extent, organized by toleration for
noise or, if you prefer, the degree of access control I choose
to exercise.  One of them -- dating back, IIR, to the early
1980s although the address and technology have changed -- is set
up to simply discard any message that arrives without strong
authentication of the sender and message authenticity such as
(in recent years) a PGP or S/MIME-signed message in a key I have
previously validated.  Not suitable for general use by typical
Internet users and close to the very worst form of the
Introduction problem but it never receives mail from unwanted
parties.  To a greater or lesser degree, those who use other
addresses take their chances and I with them.  

Do I recommend that?  Nope,  But, again, I'm trying to see if we
can clarify the boundaries and what is being talked about a bit.

>> The notion that anyone with scant technical knowledge can
>> impersonate
>> > anyone else via telephone or email is more stupid on a
>> > bigger stick.
>> 
>> It's *always* been possible to lie about who you are when
>> making a phone call, but for the first century or so nobody
>> cared.  Whhat changed?

> The cost of calling people dropped, robo-calling, in
> particular the cost of international calling dropped enabling
> off shore boiler rooms filled with criminals calling up to do
> scam after scam.

Doesn't that suggest looking at ways to change either the cost
equation or the very closely related equations involved risks to
those criminals of capture and punishment rather than yet
another tweak.     FUSSP should probably be incorporated by
reference here.

>> The trick is to add enough friction to messaging to make it
>> unattractive to spam but not cripple it as a service.  I can
>> currently think of somewhat effective voice message friction
>> ("press N to complete your call") but we've completely failed
>> to come up with effective email friction, and e-postage ain't
>> it.
>...

> The exception to that in my current code is that there is one
> message, a contact request message that is authorized by
> default. So, if I have your contact address (john@xxxxxxxxxxx,
> @john_levine, whatever) and I don't already have you in my
> contacts, the first message I send, is a contact exchange
> request saying 'Hi I am PHB, can I send you messages'.
> 
> If you respond yes, I can send you additional messages, if you
> let me, I can call you by voice or video etc. Otherwise, my
> messages are refused. Same on my end.

And, if I were an evildoer and wanted to make that not work, I'd
attack you (and a variety of other likely suspects) with a
sufficient volume of permission-request messages to create
tremendous incentives for blocking those messages.  As you
pointed out in response to Christian's variation on the same
suggestion, the number of such requests today is low enough to
be easily tolerated.  But no mechanism that has depended on the
spammers (and other generators of unwanted messages) being
stupid (and I am _not_ suggesting that your ideas fall into that
category) has ever worked well.  In particular, if one assumes
that they are, as a group, both reasonably smart and able to
think strategically, one would expect to see very few messages
asking permission until after something changed to make
generating such messages a good investment.  Analogies to arms
races and why they are such a problem may be appropriate here.

> Given our relationship, I am not going to be giving you 'call
> me in the middle of the night' authorization. But I will
> probably allow your requests into the 'auto-scheduler' so my
> bot and your bot can arrange a mutually acceptable time for
> the call.

> The key point here is that unlike a phone number or email, my
> contact address is not a bearer token giving anyone
> authorization to send me messages. So Madonna can be @madonna
> and Lewis Hamilton can be @lewis_hamilton and neither need
> worry about printing their contact address on their business
> card for fear of being slammed by fans. Now granted, they are
> probably not going to be processing their own contact requests
> but they have peeps for that.
> 
> Once we are in each other's contact catalogs, nobody else can
> impersonate you to me. I might not have been contacted by the
> real John Levine in the first place but that is another issue.

But that sounds like a version of my trick "don't bother trying
to send mail here unless I have already gotten things set up
with your credentials" mailbox (whether you know, or can deduce,
its address or not).  A more sophisticated one, most likely one
that scales better, but not a new story.  

> For interpersonal contact exchanges, trusted third parties
> aren't really very useful. But if we are communicating in the
> context of some corporation, it is important that I know both
> the person and the organization. So at least an organization
> level LRA is needed.

Absolutely.  But, if you are talking only about solving the
problems of communications sent from and/or two corporations or
organizations who are willing to identify themselves as such
(rather than, e.g., posing as individuals who might be vaguely
"representing" or "affiliated with" such a body), then that is a
much narrower problem than the one to which I (and maybe John
L., Christian, or others) have been responding and expressing
concern.

In case it isn't clear, I have no reason to believe that your
ideas would not work, and work well for some selected
communities and/or some clear definition of the problems you are
trying to solve and their scope against which it could be
evaluated.  From that perspective, my only concern is the great
difficulty of deploying a replacement for a very large installed
base when most of those involved with that base (as suppliers
and users) seem to think it is working well enough... no matter
how much they complain about the obvious problems it enables or
carries with it.   I am, however, skeptical about whether trying
to look at problems or solutions in terms of descriptive
terminology that does not have universally agreed definitions,
or arguing about those definitions ("walled garden" as a start)
is helpful in moving discussions forward.  More important, I
remain skeptical (as I have been for decades) about any
proposals that depend on recipient control of messages sent to
them if that is claimed to work at global scale and that does
not discriminate in favor of some such recipients and against
others.

best,
   john




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux