problems that aren't solvable with today's technology?
Other than protecting keys -- and, of course, DRM -- I'm very far from
convinced of it. The fault, dear Brutus, is not in our stars but in
ourselves.
--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
of Yardley's success with women. I have no idea
if that's true, though moralistic revulsion may be closer. But I
wonder if the root of the personal antagonism may be more that of the
technocrat for the manager...
--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
In message [EMAIL PROTECTED], R. A. Hettinga wr
ites:
--- begin forwarded text
Status: RO
From: Somebody
To: R. A. Hettinga [EMAIL PROTECTED]
Subject: Re: Wiretap Act Does Not Cover Message 'in Storage' For Short Perio
d (was Re: BNA's Internet Law News (ILN) - 2/27/03)
Date: Sun, 2 Mar 2003
In message [EMAIL PROTECTED], Peter Gutmann writes
:
[Moderator's note: FYI: no pragma is needed. This is what C's volatile
keyword is for.
No it isn't. This was done to death on vuln-dev, see the list archives for
the discussion.
[Moderator's note: I'd be curious to hear a summary -- it