The original, and current, Internet design has been mostly based on an honor system for the end points. The model being that the connection is less trusted than the end points, as access to the end points was granted under an honor system — and usage rules were effectively enforceable.
Reality showed that this model was upside down for commercial operation. The end points are less trusted than the connection. In fact, even if usage rules are enforceable at some connection points, the end points cannot be controlled. Anyone can connect to the network. There is no honor system. Usage rules are in fact not enforceable, users can hide and change their end points. The solution is to introduce trust as an explicit part of the design, which trust was implicit when the Internet was based on an honor system.
Of course, updating the Internet design to fit its current operating conditions is useful not only to stop spam. Social engineering and spoofing attacks also rely on the old honor system where users are trusted. "Trust no one" should be the initial state under the new Internet paradigm. The bottom line is that trust depends on corroboration with multiple channels (see Trust, above) while today we have neither (a) the multiple channels nor (b) the corroboration mechanisms. So, we lack trust because we can't communicate it.
Current work [1 and following, see RG home page] by Ed Gerck and team includes these topics, proposals and tests to combat spam, spoofing, and denial of service, as well as information-theoretic secure authentication integrated with authorization for access control.
[1] https://www.researchgate.net/publication/286459693_Toward_Real-World_Models_of_Trust_Reliance_on_Received_Information