I'm not sure I understand how having a feature designed for automatic software delopyment fits your interestingly worded response? The feature makes the data more accessible, not less, so how can it be used to hold data hostage?
> I would imagine that the un-named customers > are thinking, wisely and in advance, of the > possibility of this or that disgruntled ass > clown holding data hostage, during what one > can call "prolonged business negotiations." > There seems to be an endless supply of such > ass clowns and a much shorter supply of the > kind of malware situations to which some've > referred so call this risk management, even > if that's a right answer for wrong reasons. > > --dan > > _______________________________________________ > FDE mailing list > [EMAIL PROTECTED]://www.xml-dev.com/mailman/listinfo/fde _______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
