Secure safe sender lists are described. In an implementation, a method
includes determining which of a plurality of hierarchical levels
corresponds to a message received via a network. Each of the hierarchical
level is defined by mechanisms for identifying a sender of the message.
The message is routed according to the corresponding one of the
hierarchical levels.