Hi,

Kaushalye Kapuruge <[EMAIL PROTECTED]> writes:
> Confidential data can be in any form. And eavesdroppers would not
> neglect MTOM attachments. For example an image taken by a security
> camera that need to be transfered to the Central Investigation Unit as
> an MTOM attachment. ;) Just to name one. Also anything in the binary
> form. A secret key for example.
> So we need to make sure that its not visible in the wire
> content. That's why we need to encrypt.
Thanks all for the lucid examples.

thanks,
Dinesh.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to