On Feb 8, 2013 8:26 PM, "Randy Turner" <[email protected]> wrote: > > > If you combine the lookup with a registration and proof-of-possession algorithm (for the private key), then this might collectively be a solution…the devils always in the details however :) >
Well there's also a harvesting problem to solve, I think. You need to make it generally hard for a spammer to try all email addresses they have to convert that list into a list of jids. Obviously a bad server holding a copy of the table is the worst case here.
