In that case, I'm planning a client/server tool however I want all network
traffic to be encrypted. I'd also like to sign requests to the server
that a client may make so that I can trust that the message is
authentic.

Before plunging ahead and writing this, I thought it might be prudent to
enquire if anyone had used these tools to do something similar and have
some advice to impart.

cheers,
        r.

Reply via email to