Strong encryption can, as a practical matter, ensure the safety of a message transmitted from computer S to computer T.
It is, however, important to remember that this encryption is useless if the content of that message can be purloined at S before it is encrypted or at T after it has been decrypted. Moreover, there is anecdotal evidence that the five-eyes organizations are alert to and even that they are already actively exploiting these two vulnerabilities. How not! And if so, other less high-minded groups are too. John Gilmore, Ashland, MA 01721 - USA ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN