Well, in order to use PKI encryption, one has to have the recipient's
public key.

I think Worldtalk (now Tumbleweed) was considering to implement the
repository of remote recipients' public keys. Then one could write a
rule on Tumbleweed server that would detect that message is going from
User A to User B and automatically encrypt it with User B's public key.
I don't know if they ever implemented this feature. Depending on the
number of people communicating, this could be a very tedious task to
maintain such repository (unless it is designed to automatically snatch
public keys from every digitally signed message it sees)

Back when I used Worldtalk a few years ago there was only a way to
encrypt mail between servers - the rule would detect that mail is going
from Server A to Server B, therefore it should be encrypted with Server
B's public key.

Sincerely,

Andrey Fyodorov
Systems Engineer
Messaging and Collaboration
Spherion


-----Original Message-----
From: Miller, Robert [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 28, 2003 4:55 PM
To: Exchange Discussions
Subject: RE: Secure E-Mail

I think you are missing the point of my statement - when I stated "no
user
interaction" I am referring to not having the requirement of the
attorney
having to do anything special prior to sending the message (as with
client
side certs - where the attorney has to hit the "encrypt" button on his
toolbar before sending). I want everything done server/gateway side -
with
no "interaction" from the attorney. I hope this makes sense....

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, October 28, 2003 3:39 PM
> To: Exchange Discussions
> Subject: Re: Secure E-Mail
> 
> 
> On Tue, 28 Oct 2003, at 1:48pm, [EMAIL PROTECTED] wrote:
> > The goal is to provide our attorneys with the ability to 
> send and receive
> > secure email with their clients with 1. no user interaction 
> or training
> 
>   That is a contradiction.
> 
>   Security is about trust.  In order to trust another party, 
> you have to
> trust them to do the right thing.  You need to trust them to 
> have a secure
> system.  You need to trust them to have the latest patches.  To use a
> firewall.  To not use the same password everywhere.  To not 
> have viruses,
> worms, spyware, and peer-to-peer programs on their computers. 
>  And so on.  
> You cannot have trust if you have no interaction.
> 
>   All the technology in the world won't help you if the problem is the
> operator and not the computer.
> 
>   Anyone who says otherwise is trying to sell you something.
> 
> -- 
> Ben Scott <[EMAIL PROTECTED]>
> | The opinions expressed in this message are those of the 
> author and do  |
> | not represent the views or policy of any other person or 
> organization. |
> | All information is provided without warranty of any kind.   
>            |
> 
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Web Interface: 
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&;
lang
=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Web Interface:
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&;
lang=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]




_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Web Interface: 
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&lang=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to