> Only if you think everything has to be equally protected. That's the assertion I am not thrilled with. Sometimes knowing who sent it is more important -- the metadata -- and sometimes the content -- say, the value of the check -- is more important. And its probably easier to go around the crypto rather than through it. Why spend the compute cycles when a phishing email will usually do nicely. (I do a lot of work in US DoD and US Federal, so we have to honor security levels). Jeff