John R. Levine wrote:
Why do you simplify handling of list mail to sorting and filtering,
ignoring two other important list handling activities:
1. reading mail
2. responding to mail
Well, OK. Can you offer some non-hypothetical situations where you
would read or respond to list mail differently if there were extra
assurance on identity of the list contributor?
Until recently I used an anti-spam software package that provided the
functionality of whitelisting based on the From address.
/rolf
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html