Perry, If you'll let one more through, there's a related tool under development. See
Enforcing Access Control in Social Network Sites Filipe Beato, Markulf Kohlweiss and Karel Wouters, HOTPETS 2009, http://www.cosic.esat.kuleuven.be/publications/article-1240.pdf No 3rd party, but you have to manage your keys. Adam --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [email protected]
