How do I know if its encrypted?

James A. Donald jamesd at netcom.com
Wed Jan 11 21:29:13 PST 1995


On Wed, 11 Jan 1995, Mark Oeltjenbruns wrote:
> (3) Peform a histogram analysis on it, if it doesn't pass a certain
> threshold reject the whole thing.  Although cute, I don't like this one.

Why not -- sounds cool to me.   It is also very fast, and does not
take much programming.

It will stop all cleartext.  Probably some pictures would get through,
so it would not stop mailbombings, but a volume limitation per 
apparent user and apparent destination would stop mailbombings.

A volume limitation sounds like a lot of work to program though.



 ---------------------------------------------------------------------
We have the right to defend ourselves and our       
property, because of the kind of animals that we    http://nw.com/jamesd/
are.  True law derives from this right, not from    James A. Donald
the arbitrary power of the omnipotent state.        jamesd at netcom.com








More information about the cypherpunks-legacy mailing list