Pretty clever, open source, and small enough to evaluate. What's not to like?
Imagination will, I suspect, produce various applications right down to the 'net equivalent of "Caller #11 wins a free trip!" As to attack resistance, this is somewhat easier than reading one's web logs to see if Person X did pick up the unindexed file that you can now delete. Not to mention that re-use might indicate that Person X either shares what you told him/her not to, or has been pwned. IMHO, a small example of Good that, one hopes, does not find an enemy amongst The Best. --dan _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
