Strange that none noted that identity based encryption (IBE for the acquainted ones)solves this problem quite easily (more on <a href="http://www.voltage.com/technology/ibe.htm" rel="nofollow">http://www.voltage.com/technology/ibe.htm</a>). Boneh and Franklin scheme was the first proposed one, but nowadays this is not only on crypto papers, but they are even RFCS for such schemes: <a href="http://www.rfc-editor.org/rfc/rfc5409.txt" rel="nofollow">http://www.rfc-editor.org/rfc/rfc5409.txt</a>. There are even some non-commercial implementations around: <a href="http://crypto.stanford.edu/ibe/" rel="nofollow">http://crypto.stanford.edu/ibe/</a>.<p>Of course, not using such full blown solutions will mean that posterous' heuristics techniques will be susceptible to all sorts of attacks, such as man-in-the-middle, relay attacks and so forth.<p>On the other hand, looking for solutions that are resilient to more sophisticated attacks, mostly considering IBE schemes, is quite convoluted (it involves provable security models, such as <a href="http://www.google.com/#hl=en&q=provable+security+signature&aq=f&aqi=&aql=&oq=&gs_rfai=&fp=64f719c8669fe4b7" rel="nofollow">http://www.google.com/#hl=en&q=provable+security+signatu...</a> ). There are even variations on IBE, such as certificateless, which require you to trust even less people.<p>This is of course, assuming you are not willing to inconvenience users by making them reply a email you send them after they tried to poste. Such email would contain a custom made url (the secret) that would enable the post to actually be posted. On the other hand, this solution feels more inconvenient than using OAuth methods.<p>Nonetheless, not all users care about security/privacy (those that do, will always have the usual login scheme). If you chose to go other way, good luck to you. After all, people still use MD5 for security applications nowadays.