
|
Deployment Argument Authentication Compliments Filtering Network effect, aka Chicken and Egg problem Avoid false positives Without creating backdoors ‘Allow all mail from hotmail.com, they use rate limiting’ Allows more aggressive criteria Cryptographic Authentication is robust Asymmetric work factor No viable counter-strategies |