29 Mar
2014
29 Mar
'14
11:31 p.m.
IF the overriding problem is due to an inability to identify and authenticate the identification of the sender, then let us work on establishing a protocol for identifying the sender and authenticating the identification of the sender and permitting the receiver to accept or deny acceptance of traffic by reference to that identification.
We've got DKIM, SPF, S/MIME, and PGP. What more do you want? R's, John