On 05/19/2011 07:35 AM, Aric Fedida wrote: > Or you do it > at the software level with encryption. As a side note: end-to-end encrtyption seems to be the only solution for large scale pub/sub networks with untrusted middle nodes (devices). Martin