On Wed, Mar 26, 2014 at 4:23 AM, John Young <j...@pipeline.com> wrote:
> Ubiquitous use of a comsec system is a vulnerability, whether
> PGP or Tor or another popular means.


"Ubiquitous trust in technology without assurances nor fail-safes is a
vulnerability"
  - fixed that for you JYA

plenty of corollaries in architecture, to be sure.

;)

Reply via email to