David Crocker writes:
Let me suggest the strawman approach, in particular that we start by
asserting that Mime is an object standard and that the multipart/encrypted
and multipart/signed mechanisms provide substantial, initial utility. Let
me suggest that the key deficiencies to this model/method be defined, to
see whether relatively small changes will permit relatively quick use.
"Key" deficiencies are fundamental showstoppers for basic functionality.
This sounds good to me. This could leverage off the MIM-PEM analysis
already being done. Other opinions?
Phil Smiley