ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Collection of use cases for SSP requirements

2006-11-09 08:56:43


Steve Atkins wrote:
Well at least it is a start to force the phishers into using look-alikes.

No, it isn't. There is no way in which SSP makes this better.
Depending on how it's implemented by recipients there are ways
in which it makes it worse.


Steve,

Anything said that firmly -- and saying something many will consider unexpected -- really does require the details that justify it.

This is a hearty "please" requesting that you elaborate.

d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>