> Why should I believe that a sufficiently determined > adversary couldn't somehow obtain a bootleg copy of > IOS source?
So tell me which of the following setups is the most secure: a) The one that requires, in order to be hacked, to get a bootleg copy of the IOS source, all the tools needed to compile it, understand how it works, be able to modify the code... b) The one that does not? Michel. -------------------------------------------------------------------- IETF IPng Working Group Mailing List IPng Home Page: http://playground.sun.com/ipng FTP archive: ftp://playground.sun.com/pub/ipng Direct all administrative requests to [EMAIL PROTECTED] --------------------------------------------------------------------
