• Interesting, but this still doesn't solve the key issue. Transmitting the key along with the data defeats the purpose to some extent. Any tool like profiler or a network sniffer would render this useless.

    Steve Jones

    steve@dkranch.net