While an interesting topic, this seems only peripherally related to DKIM
and I wonder whether a different venue, such as the ASRG list, would be
more appropriate.

-Jim

Hallam-Baker, Phillip wrote:
> I think that I am working towards a rather broader critique of the way that 
> SpamBayes &ct. are applied.
>
> Naïve Bayesian learning schemes are intrinsically vulnerable to 
> counter-programming. They work on a small scale only because there is not a 
> sufficient value to counter-programming.
>   
> ...
>   
_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to