>IF the overriding problem is due to an inability to identify and 
>authenticate the identification of  the sender, then let us work on 
>establishing a protocol for identifying the sender and authenticating 
>the identification  of the sender and permitting the receiver to accept 
>or deny acceptance of traffic by reference to that identification.

We've got DKIM, SPF, S/MIME, and PGP.  What more do you want?

R's,
John

Reply via email to