I'm surprised Mundie didn't use Wikipedia (Not Invented Here?) before he spouted off - there's already a driving licence for computers at least (though it strangely doesn't include Internet 'skills') called the
European Computer Driving Licence or ECDL for short. Although it started in Europe, it's spread worldwide ("European" becomes "International", so it's then known as ICDL) to 148 countries, including the US.
I seem to remember that it's very Microsoft-oriented though - the courses typically involve MS applications and probably don't consider alternatives (OpenOffice.org etc.) at all. I guess that makes it even more ironic that Mundle didn't refer to it. And, no, I've never taken the ECDL/ICDL so does that mean I'm guilty of "computing without a licence"?
There's nothing better than driving to the local municipal airport, parking in the lot, and walking directly from the car to the plane (conveniently parked 100 yards away). No TSA, no jerks loudly talking on their cell phones, no one to destroy your luggage, and comfortable seating. Not to mention the "always a direct flight" perk.
Yes, I consider myself very lucky to have a relative (by marriage) with his own jet. God knows I couldn't afford one!
Well, but you're making the huge assumption that any security breach must occur because of a breakdown of the fundamental cryptographic protocol. In fact, all publicly known ssh vulnerabilities have been the result of implementation errors of one sort or another.
So, the question is: Are you more likely to encounter implementation errors or other commonplace security flaws during key negotiation or during stream encryption? I think the answer is pretty clearly key negotiation, because the attack surface is larger. Unless you're worried you might lose control of the open session to a local attacker.