. . . . "Further, the file listing and any other information sent from the laptop 12(1) is encrypted using the public key for the laptop 12(2) as stored in the list 30." .