tag:blogger.com,1999:blog-6936134049134982166.post8482960742756517808..comments2023-09-11T04:09:47.079-04:00Comments on Devil's Advocate Security: How the President's Security Motorcade WorksDavidhttp://www.blogger.com/profile/00465683521970634631noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-6936134049134982166.post-77607634547722990642011-02-11T18:07:12.819-05:002011-02-11T18:07:12.819-05:00And is it true that they - as they should, rely no...And is it true that they - as they should, rely not on the secrecy of their program, but on secrecy of per-instance "keys"?G.L.Dobbinshttps://www.blogger.com/profile/00703336647395455080noreply@blogger.com