Endnotes

Security Considerations

Unlike many existing systems that require great complexity of use, this design shows that it is simple, does not require the use of any database or maintenance.

With full control of what you want actually receive, enables companies to improve their productivity. Reduces operating costs because potential losses before they created threats are now being calculated and controlled.

With the uncongested network, servers and computers, improve performance

Public disclosure of P2T addresses can be used without restrictions.

The identification of those involved in communication can the necessary security to allow the “No Refusal”.

The BotNet networks it becomes incompatible increasing drastically security for holding the mail.

The spread of dubious files becomes very limited because only pass to circulate the messages that are of interest to the recipient. The delivery guarantee is unnecessary.

This procedure is not a ban nor violates Articles 37, 42 or 61 of the Portuguese Constitution, (freedom of speech / information, cultural creation and free enterprise respectively) for users of email services. Even these principles may admit sending millions of spam free form, such a model contrary to what one might think, will only bring discomfort to the abuser user.

The anti-spam techniques still in force, and may in the future together, complementing and reinforcing the P2T while being unnecessary to the game, their use will have a load of work radically insignificant compared to the current state method.

Some countries opt for a system that allows the sending of Spam until the aggrieved feel obliged to subsequently require future cancellation (OPT OUT) and others choose to force the sender to ask the recipient’s consent in case of direct marketing, but that in case of spam, do not define objectively leaving permeable abuse by offenders (OPT iN). This study ends with any questions between one system or another, since technically prevents either.