@uc not explicitly. But there are great patterns to borrow from email. Any server can refuse to deliver any activity. Bayesian filtering and shared blocklists can help, too.