did exactly same. the only difference is that i use compromised emails to train spam filter