http://www.w3.org/ns/prov#value | - Because the server itself could be operated by the same malicious party that sent the malicious message, the recipient can optionally authenticate the server, for example using techniques described in the related applications, or by communicating with the sender without using any links or buttons contained in the message.
|