Secure safe sender lists are described. In an implementation, a method
includes examining a message received from a sender via a network to
determine which identifying mechanisms are available for verifying an
identity of the sender. When one or more available identifying mechanisms
are deemed sufficient to verify the identity, a description of the
identity and a description of the one or more said available identifying
mechanisms are added to a safe senders list.