Taxonomy of anti-spam techniques: Difference between revisions
From ASRG
Jump to navigationJump to search
No edit summary |
mNo edit summary |
||
Line 43: | Line 43: | ||
* [[Subject keywords]] | * [[Subject keywords]] | ||
==Message validation techniques== | ==[[Message validation techniques]]== | ||
* [[Cryptographic signatures]] | * [[Cryptographic signatures]] | ||
Line 49: | Line 49: | ||
* [[Signature callback]] | * [[Signature callback]] | ||
==Introduction techniques== | ==[[Introduction techniques]]== | ||
* [[Challenges]] | * [[Challenges]] |
Revision as of 14:01, 12 August 2008
Many people have invented many anti-spam techniques over the past decade. And a lot of the techniques keep being reinvented. Our goal here is to list all the anti-spam techniques we know, both the good ones and the bad ones.