Not so sure, Lee. Perhaps it is my ignorance of encryption for everyday personal use, but in the instance where someone told their financial institution to send the money to the wrong account, how would encryption have helped?
Just curious. What kind of workflow would I set up to protect me from such fraud by using encryption? How will I know that I am not sharing my keys with the wrong person? Certainly encryption protects you from most man-in-the-middle snooping, but not from someone you have shared keys with. I think the article is more saying to have multiple factors of authentication, so that you know who you are sending $200K to (or sharing your keys with). I am sure that many (not all, or may not even a majority) companies have all kinds of encryption in place, but when you get an email from your CEO that tells you to wire a large chunka change to a vendor in China, you better have other procedures in place to confirm that that actually came from your CEO. Jonathan > On Apr 28, 2017, at 12:00 PM, Lee Larson <[email protected]> wrote: > > I read the article and the comments… encryption was never mentioned. All > encryption schemes include digital signatures, which are almost impossible to > spoof. -- Jonathan Fletcher [email protected] Kentuckiana FileMaker Developers Group Next Meeting: 5/23/17 _______________________________________________ MacGroup mailing list Posting address: [email protected] Archive: <http://www.mail-archive.com/[email protected]/> Answers to questions: <http://erdos.math.louisville.edu/macgroup/>
