While an interesting topic, this seems only peripherally related to DKIM
and I wonder whether a different venue, such as the ASRG list, would be
more appropriate.
-Jim
Hallam-Baker, Phillip wrote:
I think that I am working towards a rather broader critique of the way that
SpamBayes &ct. are applied.
Naïve Bayesian learning schemes are intrinsically vulnerable to
counter-programming. They work on a small scale only because there is not a
sufficient value to counter-programming.
...
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html