At 01:31 PM 7/18/2002 -0500, Ivan R. Judson wrote: >If you want to eliminate eavesdropping, the easiest mechanism is to use >a bridge, which has performance trade-offs. However, the paranoid among us note that the unicast traffic can be snooped by a thirdparty somewhere between the endpoints. (How much do you trust the folks running the bridge host). --bob