> Why should I believe that a sufficiently determined
> adversary couldn't somehow obtain a bootleg copy of
> IOS source?

So tell me which of the following setups is the most secure:

a) The one that requires, in order to be hacked, to get a bootleg copy
of the IOS source, all the tools needed to compile it, understand how it
works, be able to modify the code...

b) The one that does not?

Michel.


--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to