S.Isaac Dealey wrote:
>> Incorrect, they are both equally INSECURE.  One could
>> argue that a post is slightly hidden by a thin veil.  But
>> it is not hard to look behind that veil and get all the
>> data.
> 
> I take it you're recommending an alternative? ... Let me guess -- a
> time-locked safe with a print copy of the data that's transported to
> the remote location via armored car.

Since the weak point is the the spyware infested computer that is 
used, that wouldn't help. It is the same spyware infested 
computer that is used to print it.

Jochem

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:213140
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to