Not so sure, Lee. Perhaps it is my ignorance of encryption for everyday 
personal use, but in the instance where someone told their financial 
institution to send the money to the wrong account, how would encryption have 
helped?

Just curious. What kind of workflow would I set up to protect me from such 
fraud by using encryption? How will I know that I am not sharing my keys with 
the wrong person? 

Certainly encryption protects you from most man-in-the-middle snooping, but not 
from someone you have shared keys with. 

I think the article is more saying to have multiple factors of authentication, 
so that you know who you are sending $200K to (or sharing your keys with).

I am sure that many (not all, or may not even a majority) companies have all 
kinds of encryption in place, but when you get an email from your CEO that 
tells you to wire a large chunka change to a vendor in China, you better have 
other procedures in place to confirm that that actually came from your CEO.

Jonathan



> On Apr 28, 2017, at 12:00 PM, Lee Larson <[email protected]> wrote:
> 
> I read the article and the comments… encryption was never mentioned. All 
> encryption schemes include digital signatures, which are almost impossible to 
> spoof.

--
Jonathan Fletcher
[email protected]

Kentuckiana FileMaker Developers Group
Next Meeting: 5/23/17


_______________________________________________
MacGroup mailing list
Posting address: [email protected]
Archive: <http://www.mail-archive.com/[email protected]/>
Answers to questions: <http://erdos.math.louisville.edu/macgroup/>

Reply via email to