Has this been discussed on the list in recent (or even ancient) memory? If so, I can't recall it, and looked thru my own archives going back a couple years and didn't find it. http://www.verysafe.com/
Harmon Seaver wrote:
Has this been discussed on the list in recent (or even ancient) memory? If so, I can't recall it, and looked thru my own archives going back a couple years and didn't find it.
why in all hell would you want to do such a thing with a proprietary, closed-source, outlook-only solution if you can do all of it with PGP? and how much difference is there between using a plugin and using PGP? to the end-user, it's all magic anyways.
Agreed, it's clearly not a solution -- I'm just amazed that with all the flack about ZK, something even worse goes unnoticed. Or are there so many of these pseudo-secure outfits that it would be a waste of bandwidth to comment. I thought it also interesting that if you try to go to their site with java turned off, you get nothing but a blank, white page. Or maybe that's just in netscape. Tom Vogt wrote:
Harmon Seaver wrote:
Has this been discussed on the list in recent (or even ancient) memory? If so, I can't recall it, and looked thru my own archives going back a couple years and didn't find it.
why in all hell would you want to do such a thing with a proprietary, closed-source, outlook-only solution if you can do all of it with PGP?
and how much difference is there between using a plugin and using PGP? to the end-user, it's all magic anyways.
Tom Vogt wrote:
Harmon Seaver wrote:
Has this been discussed on the list in recent (or even ancient) memory? If so, I can't recall it, and looked thru my own archives going back a couple years and didn't find it.
why in all hell would you want to do such a thing with a proprietary, closed-source, outlook-only solution if you can do all of it with PGP?
and how much difference is there between using a plugin and using PGP? to the end-user, it's all magic anyways.
Oh no, This is a wonderful idea. After all, once you get someone used to receiving executables, they'll run anything. You can then attach any trojans you want. This must have been thought up by an LEO; who else would think up such an evil way of "securing" email. -- ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\ \|/ :aren't security. A |share them, you don't hang them on your/\|/\ <--*-->:camera won't stop a |monitor, or under your keyboard, you \/|\/ /|\ :masked killer, but |don't email them, or put them on a web \|/ + v + :will violate privacy|site, and you must change them very often. --------_sunder_@_sunder_._net_------- http://www.sunder.net ------------
participants (3)
-
Harmon Seaver
-
sunder
-
Tom Vogt