| http://www.w3.org/ns/prov#value | - It seems they can get at anything, pretty much, if they want to.posted by Azaadistani at 3:15 AM on January 10, 2012 Azaadistani; this MetaTalk thread is a good starting point to answering your question about day-to-day use of encryption.posted by odinsdream at 6:24 AM on January 10, 2012 There are two answers depending upon whether your talking about user-to-user or user-to-server encryption, Aza
|