In article <9506052155 .
com> you write:
>end-to-end encryption. It appears that one feature that distinguishes this
>private network from the end-to-end encryption products is that it doesn't
>depend on the performance problems of public Internet providers.
You mean, the fact that if you can only encrypt at 300Kb/s, and you
have only a T1, then the bottleneck is the pipe, not the encryption
>network security was a reference to the fact that since this private used
>static routing and was therefore more secure than the public Internet. In
That is, until they decide that having their entire operations go
down with one errant backhoe operator...
>If anyone on the list has more insight into this I would like to hear it.
Like others, I think you want to limit your vulnerability to
organizations that you do not have administrative control over.
:!mcr!: | <A HREF="http://www.milkyway.com/">Milkyway Networks Corporation</A>
Michael Richardson | Makers of the Black Hole firewall
NCF: aa714 || xx714 | +1 613 566-4574 ... mcr @
Home: <A HREF="http://www.sandelman.ocunix.on.ca/People/Michael_Richardson/Bio.html">mcr @
ca</A>. PGP key available.