Nope. Allow me to use a fiat analogy here. When you look at your banking app, you should see a bank balance, and transactions coming in and out. Anything else is spam. If you see an ad for diapers, that is spam and it doesn't belong there.
That does not make the faintest logical sense whatsoever. You made an arbitrary definition of what the app is supposed to be, what you do not want to see in there and you declared it as spam. The bank may come with ads and all kinds of secondary feature. You don't get to dictate what "spam" is in this case, except only for yourself. If you want to be a mentally deranged person, you could even consider transactions coming in as spam. Nothing stops you from doing that, but it won't mean anything to anyone else. Neither the diaper ads thing is correct, these ads may be very useful for someone else.
Same with the bitcoin chain. You should see balances and bitcoin being moved around. If you see a jpeg or a rune, or ordinal, stamp, or anything else that is not money, that is spam.
Anything can be money, including jpegs, runes, stamps, ordinals, whatever. You do not get to dictate the definition of money nor of spam. It would be easier for everyone involved if you just admitted that all you really want to do is look at CSAM footage. Your kind is not so smart with concealing yourselves. After all, it is the key part of luke-jr's proposals.

In fact spammers know very well that the only use case of bitcoin is money. Which is why they try so hard to make their spam look like genuine monetary transactions to the network.
They do this with dust output in fake pubkeys, fake scripthash, and using the Segwit exploit and the Taproot exploit.
They are not users, they are attackers, grifters, spammers.
They are not trying hard at all, just because some methods exist or have been used occasionally that does not mean that someone is trying something. Most of what you consider "spam" is obvious in terms of how it looks like on the network. The "attackers" do not yet have an incentive to utilize advanced methods of covering up their data, but if you start applying filters they will.
