Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ImJustAnotherOkie
So, I agreed. Nobody has ever invented a back door that could be exploited.

Then why did you imply that someone could intercept the data flow and descript it?

24 posted on 09/03/2015 2:11:04 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 23 | View Replies ]


To: Swordmaker

All electronic communication is subject to interception.

It’s routed from server to server and all points in between.


25 posted on 09/03/2015 3:15:13 PM PDT by ImJustAnotherOkie
[ Post Reply | Private Reply | To 24 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson