On Oct 11, 2012, at 10:44 AM, Greg Stein <[email protected]> wrote: > > (assume secure Infrastructure)
That's a pretty big assumption isn't it? There have been public instances where open source infrastructures have been hacked, and releases have been messed with. I think keys removes the need for the assumption. -- Ian Holsman [email protected] http://doitwithdata.com.au PH: +61-400-988-964 Skype:iholsman --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
