On Fri, 26 Jul 2002, Ed Wilts wrote: > And while it's running, the user simply copies the file out of /tmp and > your encryption is shot.
Well, he *could* futz with file permissions, but you're essentially right. This is why closed-source security solutions are almost always bad ju-ju: no peer review. Still, his idea isn't any less commercially viable than most of the other snake oil out there. Caveat emptor. -- "The only thing that helps me maintain my slender grip on reality is the friendship I share with my collection of singing potatoes." - Holly, JMC Vessel *Red Dwarf* _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list