On Wed, May 13, 2009 at 3:38 PM, Hetz Ben Hamo <het...@gmail.com> wrote: > Well, the authentication is secured. Without keys, no access...
In that case you had better be good at keeping backup copies of the keys and depending upon whose data it is making sure they know exactly where to get them if they need to. I occasionally see postings from people who have encrypted data belonging to long dead family members that they have no way of retrieving. You also don't want to be disturbed on vacation when a file gets corrupted and no one has the key to the backup, or if they do have it, knows that they do. Geoff. -- Geoffrey S. Mendelson N3OWJ/4X1GM Jerusalem, Israel _______________________________________________ Linux-il mailing list Linux-il@cs.huji.ac.il http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il