S.Isaac Dealey wrote: >> Incorrect, they are both equally INSECURE. One could >> argue that a post is slightly hidden by a thin veil. But >> it is not hard to look behind that veil and get all the >> data. > > I take it you're recommending an alternative? ... Let me guess -- a > time-locked safe with a print copy of the data that's transported to > the remote location via armored car.
Since the weak point is the the spyware infested computer that is used, that wouldn't help. It is the same spyware infested computer that is used to print it. Jochem ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Logware (www.logware.us): a new and convenient web-based time tracking application. Start tracking and documenting hours spent on a project or with a client with Logware today. Try it for free with a 15 day trial account. http://www.houseoffusion.com/banners/view.cfm?bannerid=67 Message: http://www.houseoffusion.com/lists.cfm/link=i:4:213140 Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4 Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4 Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4 Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

