I first encountered David Strom many, many years ago when I worked at UCLA, early in personal computing history. Since then, he has gone on to make a name for himself in the computer security world. Today, he discusses a topic that is often tossed around by my friends and old colleagues and is frequently asked of me directly. So I defer to David’s take on the matter here.