So no one wants to touch this one, huh? Let me ask a simpler question then. A client wants to send me data, but insists that it must be encrypted. I'm like "cool". They say, "send me your public key".
Networked computing is a double-edged sword. Connectivity makes transparent sharing of data through e-mail, Web sites, and ftp archives possible, but it also invites unwanted access to your data.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback