I wasn't being modest when saying I can't take credit.
Everyone person in the computer security business worth his/her keep knows about encryption and/or compression being common techniques for masking malware signatures. Protection via blocking encrypted/compressed attachments is mostly a desirable next step. If there're few deployments, it could be because of a low benefits/costs ratio. Kelsey did point out that few viruses use email as a vector nowadays (though he might not have considered other malware).
Anyhow, the first to come up with an idea isn't necessary the same person who strikes gold. To do that, one must come up with an implementation that corners the market, and be able to defend legally the claim of originality. The latter is especially an onus few could bear. The person(s) who came up with SpamAssassin probably gave it away for free.
Having said all that, I wish you every luck if you decide to take on this project yourself.
Everyone person in the computer security business worth his/her keep knows about encryption and/or compression being common techniques for masking malware signatures. Protection via blocking encrypted/compressed attachments is mostly a desirable next step. If there're few deployments, it could be because of a low benefits/costs ratio. Kelsey did point out that few viruses use email as a vector nowadays (though he might not have considered other malware).
Anyhow, the first to come up with an idea isn't necessary the same person who strikes gold. To do that, one must come up with an implementation that corners the market, and be able to defend legally the claim of originality. The latter is especially an onus few could bear. The person(s) who came up with SpamAssassin probably gave it away for free.
Having said all that, I wish you every luck if you decide to take on this project yourself.