| Jerry/Hal,
|
| This lemon-car analogy is interesting.
|
| One sidebar that might be worked into the argument is the
| apparently widespread side-line business where a car is
| auctioned on eBay but before the sale is consumated the
| buyer engages a mechanic to check the car out pre-sale.
| The
Jerry/Hal,
This lemon-car analogy is interesting.
One sidebar that might be worked into the argument is the
apparently widespread side-line business where a car is
auctioned on eBay but before the sale is consumated the
buyer engages a mechanic to check the car out pre-sale.
The car and the mech
| ...One example was his comparison between the security business and the
| used-car "lemons" market. The idea is that lemons dominate the used-car
| market due to asymmetric information: only the sellers know which cars
| are lemons, hence these are the ones that are mostly made available,
| hence
Hello James,
On 23/8/2007 02:25, James A. Donald wrote:
> Good news on patents, particularly crypto patents.
>
> The CAFC, the US patent court, has recently ruled that the patent holder
> cannot hit you with punitive damages unless, on the preponderance of the
> evidence, you were objectively rec
Florian Weimer <[EMAIL PROTECTED]> writes:
>The tests I've seen are mostly worthless because they do not weigh their
>results based on the actual threats a typical user faces.
A topic very similar to this came up recently on the hcisec list. My comments
there were:
We already have really, reall
Would any of you care to advance an opinion of Harold Gans?
[ "Who?" is not an opinion, and I am not asking for anyone
to go do research. ]
Offlist or on, as you prefer.
--dan
-
The Cryptography Mailing List
Unsubscribe by sen