...well you *ARE* trusting a small, third party entity with your data on the internet. Can you really expect things that are not on storage you monitor yourself to be secure? Furthermore, why can't it just store your clipboard through local storage? Does it really have to put it up online? Do Apple's apps have no way to store and retrieve local data?
Apple really should have this feature built in, but you shouldn't be surprised when your workaround that involves dumping your unencrypted data on a server somewhere has security issues.
My guess is get compliant and pay the legal costs. The rest of it is to let Cisco know that they mean business and they need to get in line with compliance, or pay the price.
Telco companies have received massive subsidies to implement new infrastructure, and they have failed to spend that money to perform the upgrades that they agreed to do. Why should we now pay even more money to get them to do the work they've already been paid to do?
Still, they could get around this by defining the "bittorrent chunk" size to be 1.5k (UDP payload size). Everything else would probably work fine.
This is a really dumb idea, considering that the torrent file carries a 160-bit hash for all the chunks. You'd wind up with your torrent file being over 1/10th of the size of the file you're trying to get in the first place.
Then you'd need a torrent for your torrent.
(Although, this itself isn't that bad an idea now that I think about it for an advanced version of the protocol... Have peers share hashing/parity information as well as the file. You'd be protected against bad hashes by the overall torrent file having hashes of the hashes. =D)
This is all you need. Spent countless hours on it. xD
"Luke, I'm yer father, eh. Come over to the dark side, you hoser." -- Dave Thomas, "Strange Brew"