On 29 Dec 2010, at 03:27, Jay Ashworth <j...@baylink.com> wrote:
> 
> If you do not, then your clients have little hope of spotting insider 
> malfeasance changes, no?

No cryptography can expose the difference between data that is correctly signed 
by the proper procedures and data that is correctly signed by a corrupt 
procedure.

Tony.
--
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/


Reply via email to