>The idea is to anticipate any unknown signature breaker.

I'm pretty sure that's specifically out of scope.

And I promise that whatever you do, short of wrapping the whole
message in opaque armor, I can come up with something that will
break it.

Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. http://jl.ly

_______________________________________________
NOTE WELL: This list operates according to 
http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to