Mike, the keys are encrypted with an OTP that only the intended recipient can open - a special, subsystem used for that purpose only - employing the same techniquers, but entirely separate and apart from the primary user system - any inteceptor would have to break trhe system, which we claim is impossible. On Wed, 21 Feb 1996, Mike McNally wrote:
IPG Sales writes:
We do not keep copies, we would not be in business 30 days if we did.
How do you ensure that the keys are not intercepted, duplicated by a man-in-the-middle, and forwarded?
______c_____________________________________________________________________ Mike M Nally * Tiv^H^H^H IBM * Austin TX * I want more, I want more, m5@tivoli.com * m101@io.com * I want more, I want more ... <URL:http://www.io.com/~m101> *_______________________________