Yes and what is another customer of the ISP submits mail using my From. in
virtually all cases today there is nothing to prevent that.
If you give your keys to untrustworthy third parties, all bets are
off. No amount of extra protocol goop is going to change that.
R's,
John
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html