On Sun, Nov 30, 2008 at 06:09, Rich Kulawiec <rsk(_at_)gsp(_dot_)org> wrote:
Second, it's not a prerequisite to doing anything technical about spam.
It's a prerequisite to doing anything technical about spam *that requires
treating those systems as trustworthy*.
Since a pwned machine can impersonate the user to any degree necessary, that
means spammers can send e-mail which is identical to e-mail sourced by the
user. Hence you just eliminated all technical solutions to the problem. So
we may as well shut down the list.
mathew
_______________________________________________
Asrg mailing list
Asrg(_at_)irtf(_dot_)org
https://www.irtf.org/mailman/listinfo/asrg