On 29 Dec 2010, at 03:27, Jay Ashworth <j...@baylink.com> wrote: > > If you do not, then your clients have little hope of spotting insider > malfeasance changes, no?
No cryptography can expose the difference between data that is correctly signed by the proper procedures and data that is correctly signed by a corrupt procedure. Tony. -- f.anthony.n.finch <d...@dotat.at> http://dotat.at/