Here's what seems a related topic
Reuters Link. What I thought interesting was that towards the end of the article they recommend running a mix of systems at a company or agency. How are they going to be able to do that and still use this personal encryption thingy that you can only get from MS mentioned in the original article? Sounds like some kind of Catch-22. But then again this topic started off outside my area of expertise and kept going. Still, I am appreciating the insight and devirsity of responses.