Do you actually somehow enforce your email delivery over SSL only? Otherwise the fact that it can go over SSL doesn't help in this discussion. Maybe look into S/MIME if you're really decided on this email thing and it isn't just a quick hack tacked on in the wake of GLBSE without any structural consideration.
In SMTP it's on the recipient to choose how secure they want to be.
As far as I know email addresses can either be safe or anonymous. There's no way for someone to have both.
Incorrect.
You're asking me as if I'm proposing this. I am not.
If you are in fact doing something like that, the problems are too many to list.
If you go back I was responding to your sentence listing "usernames" as things I might be including in the email. You have a way of quoting just enough to confuse people.
This happens to be false. The problems have been amply discussed in the Goat delisting threads, please look there.
I have read them thoroughly. It is a completely different issue. The lists goat received did not include email addresses, which are independently verifiable vessels of ownership. There's no way someone can claim the same shares twice from the same email...
Yes, and this openness pays you the dividend that people who otherwise wouldn't be interested or know enough to comment can point out (free of charge) what they perceive as problems with your designs. You're the recipient of a gift not the accused of a crime, simmer down.
I definitely appreciate the input. Perhaps it's the barbs that come with it that ruffle my feathers.
This is absolutely not the case. In fact, I could use your email address to register an MPEx account, and while you'd know I emailed something to MPEx so you could maybe guess it's a new account if it is anything at all, you couldn't find out if I had or have funded it, bought anything, etc.
Eh... this one confused me. How do you propose using someone else's email address and still achieving two way communication? Either you receive mail at the address (rendering it yours, whether you stole it or not) or you do not. Sure, spoofing an outgoing message is easy enough, but it is not so easy to receive the reply.
A used laptop which you can format and dump some sort of Linux on is maybe 100 dollars. But that aside, people dealing straight on MPEx are a lot better capitalized and a lot more sophisticated than you seem to imagine.
Please do not take my criticisms as an attack toward your user base. It clearly takes a knowledgeable individual to trade on MPEx.
Your comment about passwords being leaked is kind of the point behind 2FA such as google authenticator. If your password is leaked, it's not the end of the world. (I suggest reading up on yubikey/google auth.)
I also do not think the MPEx is as strong as you think it is. Linux is great, but certainly not without it's issues. (been using it for a desktop over 15 years now.) Bottom line is that with MPEx if your desktop is owned, you're owned. Both of the pieces required to trade (key + pass phrase) would reside on the machine if the attacker is reasonably intelligent enough to install a keylogger.
Cheers.