On Mon, Jun 28, 2010 at 9:28 PM, Wes Kussmaul <[email protected]> wrote:
> ron minnich wrote:
>>
>>
>> https://www.signup4.net/UPLOAD/STRA10A/DARP31E/CRASH%20Proposer%20Day%20v2.pdf
>>
>
> Innate or adaptive, it's all based upon the flawed premise that it's
> possible to determine the intentions of the sender of a stream of bits. It
> is not possible to determine the intentions of the sender of a stream of
> bits.
>
> This is the pointless electronic countermeasures race all over again.
>
> The solution was well developed, then obscured by the telephone century.
> http://quietenjoyment.net/slides2j.swf
>
> Wes Kussmaul
>
> --
> Learn about The Authenticity Economy at
> http://video.google.com/videoplay?docid=-1419344994607129684&hl=en#

Anywhere legitimate identification is used, legitimate identification
can be purchased.

-sl

Reply via email to