This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


9.6.4 Additional degrees of trust may be achievable by the use of informal technical measures such as the agreement of passwords via out-of-band routes.126 These passwords may then be used with simple encryption or signing tools to demonstrate possession of the password to correspondents. Another simple technique to reduce the scope for later repudiation is to provide the client at intervals with a list of transactions to date.

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site