While an interesting topic, this seems only peripherally related to DKIM and I wonder whether a different venue, such as the ASRG list, would be more appropriate.
-Jim Hallam-Baker, Phillip wrote: > I think that I am working towards a rather broader critique of the way that > SpamBayes &ct. are applied. > > Naïve Bayesian learning schemes are intrinsically vulnerable to > counter-programming. They work on a small scale only because there is not a > sufficient value to counter-programming. > > ... > _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
