On 5 Jul 2007, at 13:41, Martin Garton wrote: > How, in an open source implementation that can easily be changed, are > you going to prevent the attacker simply changing the software to save > the decrypted content rather than displaying it? Here's a question for you - who would be happier if there was a closed source Linux version ? Andy