Hello,
My VPS fast tor exit got taken down by the host today for sending spam
emails. Apparently the upstream provider complained to them about it. I
thought SMTP was supposed to be disabled by default in the tor config,
but apparently my node was sending stuff through (even though I didn't
d
I think one possible solution would be something like this:
1) drop unless encrypted
2) even if encrypted drop unless either:
a) known person
b) email is of the form
WORK+TIMESTAMP+CONTENT
where content is the actual email and work is a proof of work: example: x
such that sha256(x+hash(content)+tim
Hmmm,
Looks like I lifted a stone that was a home for a few critters.
It gave me some insight in the underlying issues. The biggest (and
still unsolved) issue seems to be the email protocol itself that after
all these years still allows 'strangers' to drop unwanted mail.
slig