29 Dec
2010
29 Dec
'10
10:01 a.m.
On 29 Dec 2010, at 03:27, Jay Ashworth <jra@baylink.com> wrote:
If you do not, then your clients have little hope of spotting insider malfeasance changes, no?
No cryptography can expose the difference between data that is correctly signed by the proper procedures and data that is correctly signed by a corrupt procedure. Tony. -- f.anthony.n.finch <dot@dotat.at> http://dotat.at/