I'm not sure I understand how having a feature designed for automatic
software delopyment fits your interestingly worded response? The
feature makes the data more accessible, not less, so how can it be
used to hold data hostage?


> I would imagine that the un-named customers
> are thinking, wisely and in advance, of the
> possibility of this or that disgruntled ass
> clown holding data hostage, during what one
> can call "prolonged business negotiations."
> There seems to be an endless supply of such
> ass clowns and a much shorter supply of the
> kind of malware situations to which some've
> referred so call this risk management, even
> if that's a right answer for wrong reasons.
>
> --dan
>
> _______________________________________________
> FDE mailing list
> [EMAIL PROTECTED]://www.xml-dev.com/mailman/listinfo/fde

_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to