On Mon, 2 Mar 2009, Michael G Schwern wrote: > Tony Finch wrote: > > On Mon, 2 Mar 2009, Michael G Schwern wrote: > >> The fault is having the relatively simple problem of encryption entangled > >> with > >> the complex problem of identification. > > > > But they have to be otherwise the encryption is worthless :-( > > Do you use ssh?
Yes, another good example of software that combines encryption and authentication. Tony. -- f.anthony.n.finch <d...@dotat.at> http://dotat.at/ GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS. MODERATE OR GOOD.