asrg-7----Page:5
1  2  3  4  5  6  7  8  9  10 

Deployment Argument
Authentication Compliments Filtering
Network effect, aka Chicken and Egg problem

Avoid false positives
Without creating backdoors
‘Allow all mail from hotmail.com, they use rate limiting’
Allows more aggressive criteria
Cryptographic Authentication is robust
Asymmetric work factor
No viable counter-strategies
PPT Version