Dr Skip wrote: > Very ingenious... However, you've done the equivalent of giving out your > password here. Even if you change the system, I suspect there will be those > who, now knowing you do such, will forever be identifying the keys and abusing > you with your own system... > > The first tier of security is to not reveal you have something in the first place! That technique goes back a ways. People often used it with snail-mail. Sign up for a subscription to a magazine with a special middle initial or a different first name, etc. Then when you begin to get junk mail to that name, you know they sold your address. Using it to sort email is a clever hack to an old idea. -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist