From: Horst Herb <[EMAIL PROTECTED]> >> I'm after the best (and cheapest) way of doing (anonymous) biometrics, > >:-)) How can you do _anonymous_ biometrics? How can you exchange keys without meeting or exposing them to hostile interception? Devilish cunning, that's how. Any Tasmanian devils to hand?
