Not quite [OT]: News about Revolution
bobs at twft.com
Mon Feb 8 11:33:06 CST 2010
That's what they WANT you to think. ;-) But seriously, security breaches happen not by way of the measures in place, but by some breakdown in the same measures. Once the information is there, it is always going to be a temptation for interested parties to get their hands on it. All that said, the situation is no different that it already is everywhere else these days.
Besides, if they fear a revolution, they are right where we want them. :-)
On Feb 8, 2010, at 8:58 AM, Neal Campbell wrote:
> Thirdly, the process is
> incredibly controlled. The government has to give specific transactions they
> want to see (in other words, no fishing expeditions, they have to know what
> they want to see in advance), they can only see the transactions (no copies)
> and the whole process is limited to 3 people (a SWIFT representative, an
> external independent security auditor and the Treasury representative).
More information about the use-livecode