Dear All, Does anyone happen to know what encryption methods, algorithms, or procedures ASIO (Australian Secret Intelligence Organisation) uses? Any information regarding ASIO's methods, cryptographic or otherwise, would be appreciated. Yours Sincerely, Benjamin Grosman