| http://www.w3.org/ns/prov#value | - Such filtering approaches attempt to strip out everything that might vary between messages, such as the recipient's name or email address, reduce what remains of the message to a checksum and perform a lookup of the resulting checksum in a database which collects checksums of messages that are known or likely to be spam.
|