>IF the overriding problem is due to an inability to identify and >authenticate the identification of the sender, then let us work on >establishing a protocol for identifying the sender and authenticating >the identification of the sender and permitting the receiver to accept >or deny acceptance of traffic by reference to that identification.
We've got DKIM, SPF, S/MIME, and PGP. What more do you want? R's, John