https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7844
--- Comment #20 from John Hardin <jhar...@impsec.org> --- (In reply to jidanni from comment #16) > (The original message was full of > https://en.wikipedia.org/wiki/Personal_data > https://en.wikipedia.org/wiki/Web_beacon > Even asking the user to retrieve it via his > Goofy Inc. Pro Mail Browser etc. Sanitizing the PII would probably not corrupt the analysis of the message, but to avoid even that risk you could provide the spample privately to *one* of us as a gzipped email attachment. I have long experience dealing with confidential information, I'm sure Kevin does too. Are you willing to send an intact copy to me privately so that I can test changes against it? Absent that, I can ensure all of the mathematical glyphs are in the replace list and *hope* that works. > to send it to you guys would have triggered them. SA doesn't follow links when it scans and I doubt any of us will view a spample in an HTML-enabled MUA. > So you will have to just do with the Subject, > (which by the way was just raw, not base64, QP, etc. > it turns out.) Which means that the spample Bill ginned up for the bug is not an accurate representation of your real-life spam. > Anyway the point is: just catch the V word in the subject. > Thanks.) -- You are receiving this mail because: You are the assignee for the bug.