On Mon, 2 Mar 2009, Michael G Schwern wrote:
> Tony Finch wrote:
> > On Mon, 2 Mar 2009, Michael G Schwern wrote:
> >> The fault is having the relatively simple problem of encryption entangled 
> >> with
> >> the complex problem of identification.
> >
> > But they have to be otherwise the encryption is worthless :-(
>
> Do you use ssh?

Yes, another good example of software that combines encryption and
authentication.

Tony.
-- 
f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.

Reply via email to