Hi, Kaushalye Kapuruge <[EMAIL PROTECTED]> writes: > Confidential data can be in any form. And eavesdroppers would not > neglect MTOM attachments. For example an image taken by a security > camera that need to be transfered to the Central Investigation Unit as > an MTOM attachment. ;) Just to name one. Also anything in the binary > form. A secret key for example. > So we need to make sure that its not visible in the wire > content. That's why we need to encrypt. Thanks all for the lucid examples.
thanks, Dinesh. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]