Proactive security allows recovery from penetrations and exposures of secret keys. We have been working in this area for a while (initiating it, I think), and recently, we are working on a toolkit to allow applications to take advantage of proactive security - should be made publicly available later this year (August, we hope). We've made a `homepage` for proactive security, where you can see information in general and on the demo (architcture and screen shots only at this point). This site is at http://www.hrl.il.ibm.com/proactive/ Your comments (on the page, our project, or proactive security in general) are most welcome. Best Regards, Amir Herzberg Manager, E-Business and Security Technologies IBM Research - Haifa Lab (Tel Aviv Office) http://www.hrl.il.ibm.com New e-mail: [EMAIL PROTECTED] New Lotus notes mail: amir herzberg/haifa/ibm@IBMIL