On Oct 11, 2012, at 10:44 AM, Greg Stein <[email protected]> wrote:

> 
> (assume secure Infrastructure)

That's a pretty big assumption isn't it?
There have been public instances where open source infrastructures have been 
hacked, and releases have been messed with. 

I think keys removes the need for the assumption. 

--
Ian Holsman
[email protected]
http://doitwithdata.com.au
PH: +61-400-988-964 Skype:iholsman



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to