Of course, on the flip side of the equation:
Once you encrypt, you can no longer tell what YOUR users are doing
within that encrypted channel. Something to think about. . .
Henry
> -----Original Message-----
> From: Jose Nazario [mailto:[EMAIL PROTECTED]]
> Sent: Friday, April 20, 2001 10:28 AM
> To: Mogren, Jack L.
> Cc: '[EMAIL PROTECTED]'
> Subject: Re: Remote Access and the need for Encryption
>
>
> actually, yes.
>
> several ISPs have had their systems compromised and the data
> that travels
> their networks sniffed. this includes login and password
> combinations, and
> also sensitive documents. while its rare that the kiddies
> know what to do
> with these documents, are you willing to risk that?
>
> given the ease with which it can be set up, an encrypted
> tunnel between
> remote users and the home office makes sense. you don't know
> the networks
> you are traversing, you don't know their security, but you do know
the
> security needs of the information you are sending over the
> wire, which is
> to say its sensitive data.
>
> while you may not feel someone is targetting you (ie FBI, NSA, the
> Moussad, organized crime or what have you), you can bet your
> bottom dollar
> that its possible that someone is listening on those
> untrusted networks.
> why leave the information up for grabs?
>
> ____________________________
> jose nazario
> [EMAIL PROTECTED]
> PGP: 89 B0 81 DA 5B FD 7E 00 99 C3 B2 CD
> 48 A0 07 80
> PGP key ID 0xFD37F4E5
> (pgp.mit.edu)
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]