Well, in order to use PKI encryption, one has to have the recipient's public key.
I think Worldtalk (now Tumbleweed) was considering to implement the repository of remote recipients' public keys. Then one could write a rule on Tumbleweed server that would detect that message is going from User A to User B and automatically encrypt it with User B's public key. I don't know if they ever implemented this feature. Depending on the number of people communicating, this could be a very tedious task to maintain such repository (unless it is designed to automatically snatch public keys from every digitally signed message it sees) Back when I used Worldtalk a few years ago there was only a way to encrypt mail between servers - the rule would detect that mail is going from Server A to Server B, therefore it should be encrypted with Server B's public key. Sincerely, Andrey Fyodorov Systems Engineer Messaging and Collaboration Spherion -----Original Message----- From: Miller, Robert [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 28, 2003 4:55 PM To: Exchange Discussions Subject: RE: Secure E-Mail I think you are missing the point of my statement - when I stated "no user interaction" I am referring to not having the requirement of the attorney having to do anything special prior to sending the message (as with client side certs - where the attorney has to hit the "encrypt" button on his toolbar before sending). I want everything done server/gateway side - with no "interaction" from the attorney. I hope this makes sense.... > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > Sent: Tuesday, October 28, 2003 3:39 PM > To: Exchange Discussions > Subject: Re: Secure E-Mail > > > On Tue, 28 Oct 2003, at 1:48pm, [EMAIL PROTECTED] wrote: > > The goal is to provide our attorneys with the ability to > send and receive > > secure email with their clients with 1. no user interaction > or training > > That is a contradiction. > > Security is about trust. In order to trust another party, > you have to > trust them to do the right thing. You need to trust them to > have a secure > system. You need to trust them to have the latest patches. To use a > firewall. To not use the same password everywhere. To not > have viruses, > worms, spyware, and peer-to-peer programs on their computers. > And so on. > You cannot have trust if you have no interaction. > > All the technology in the world won't help you if the problem is the > operator and not the computer. > > Anyone who says otherwise is trying to sell you something. > > -- > Ben Scott <[EMAIL PROTECTED]> > | The opinions expressed in this message are those of the > author and do | > | not represent the views or policy of any other person or > organization. | > | All information is provided without warranty of any kind. > | > > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Web Interface: http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=& lang =english To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED] _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Web Interface: http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=& lang=english To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED] _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Web Interface: http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&lang=english To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED]

