On Feb 8, 2013 8:26 PM, "Randy Turner" <[email protected]> wrote:
>
>
> If you combine the lookup with a registration and proof-of-possession
algorithm (for the private key), then this might collectively be a
solution…the devils always in the details however :)
>

Well there's also a harvesting problem to solve, I think. You need to make
it generally hard for a spammer to try all email addresses they have to
convert that list into a list of jids.

Obviously a bad server holding a copy of the table is the worst case here.

Reply via email to