> S.Isaac Dealey wrote:
>>> Incorrect, they are both equally INSECURE.  One could
>>> argue that a post is slightly hidden by a thin veil.
>>> But
>>> it is not hard to look behind that veil and get all the
>>> data.
>>
>> I take it you're recommending an alternative? ... Let me
>> guess -- a
>> time-locked safe with a print copy of the data that's
>> transported to
>> the remote location via armored car.

> Since the weak point is the the spyware infested computer
> that is
> used, that wouldn't help. It is the same spyware infested
> computer that is used to print it.

I never said the data had been printed from a computer... just that it
was printed data... you know, from a Gutenberg press. :)


s. isaac dealey   954.522.6080
new epoch : isn't it time for a change?

add features without fixtures with
the onTap open source framework

http://www.fusiontap.com
http://coldfusion.sys-con.com/author/4806Dealey.htm




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:213149
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to