On Tue, 27 Jun 2000, Jeffry Smith wrote:

> 
> So of course, you set it up to do public key verification of the two
> ends, which negotiate the encryption, but the system lets anyone do
> the download.  You're assured that the server is who you think they
> are, and no one can man-in-the-middle hijack your matter stream.  Of
> course, if it were bounced & split, then you'd have two pepsis
> somewhere, but that's something I'm not "will"ing to bring up.
> 
> jeff
> 

Of course, that assumes that the encryption could be broken by the
people getting the bounced stream, but that would only happen if
someone was using some kind of content scrambling system that wasn't
peer-reviewed.  Say something designed by the RIAA (Replication
Industry Association of America).

jeff

------------------------------------------------------------------------
Jeffry Smith      Technical Sales Consultant     Mission Critical Linux
[EMAIL PROTECTED]   phone:603.930.9379   fax:978.446.9470
------------------------------------------------------------------------
Thought for today:  Once it hits the fan, the only rational choice is to sweep it up, 
package it,
and sell it as fertilizer.



**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to