Pretty clever, open source, and small enough to evaluate.
What's not to like?

Imagination will, I suspect, produce various applications right
down to the 'net equivalent of "Caller #11 wins a free trip!"
As to attack resistance, this is somewhat easier than reading
one's web logs to see if Person X did pick up the unindexed
file that you can now delete.  Not to mention that re-use might
indicate that Person X either shares what you told him/her not
to, or has been pwned.

IMHO, a small example of Good that, one hopes, does not find an
enemy amongst The Best.

--dan

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to