Of course, on the flip side of the equation:

Once you encrypt, you can no longer tell what YOUR users are doing
within that encrypted channel. Something to think about. . .

Henry

> -----Original Message-----
> From: Jose Nazario [mailto:[EMAIL PROTECTED]]
> Sent: Friday, April 20, 2001 10:28 AM
> To: Mogren, Jack L.
> Cc: '[EMAIL PROTECTED]'
> Subject: Re: Remote Access and the need for Encryption
> 
> 
> actually, yes.
> 
> several ISPs have had their systems compromised and the data 
> that travels
> their networks sniffed. this includes login and password 
> combinations, and
> also sensitive documents. while its rare that the kiddies 
> know what to do
> with these documents, are you willing to risk that?
> 
> given the ease with which it can be set up, an encrypted 
> tunnel between
> remote users and the home office makes sense. you don't know 
> the networks
> you are traversing, you don't know their security, but you do know
the
> security needs of the information you are sending over the 
> wire, which is
> to say its sensitive data.
> 
> while you may not feel someone is targetting you (ie FBI, NSA, the
> Moussad, organized crime or what have you), you can bet your 
> bottom dollar
> that its possible that someone is listening on those 
> untrusted networks.
> why leave the information up for grabs?
> 
> ____________________________
> jose nazario                                               
> [EMAIL PROTECTED]
>                    PGP: 89 B0 81 DA 5B FD 7E 00  99 C3 B2 CD 
> 48 A0 07 80
>                                      PGP key ID 0xFD37F4E5 
> (pgp.mit.edu)
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to