(This essay hits many very effective points. One of the key
things that needs to be borne in mind, however, is the fact
that technological proposals currently on the table are
implementations of the notion, foreign to American society
and jurisprudence, of creators' moral rights -- a term
Date: Wed, 18 Sep 2002 14:27:56 -0400
From: [EMAIL PROTECTED]
Subject: Physics News Update 605
PHYSICS NEWS UPDATE
The American Institute of Physics Bulletin of Physics News
Number 605 September 18, 2002 by Phillip F. Schewe, Ben Stein, and James
Riordon
[...]
FAST, CHEAP RANDOM NUMBERS.
Charles McElwain wrote:
James Gleeson, a physicist at Kent State
University (330-672-9592, [EMAIL PROTECTED]) has come up with a
cheap, fast solution. He shoots laser light into a sample of liquid
crystals. But because the sample is subject to a turbulent flow, causing
haphazard
Hi Nomen
I am sending to crypto only as I am not on any of the other aliases you sent
to. Feel free to fwd.
How about hacked instead of broken? Broken implies that a machine
doesn't work; hacked implies it has been changed somehow but that it still
works. Let's say that a hacked Pd machine is a
Peter N. Biddle wrote:
[...] You can still extract everything in Pd via a HW attack. [...]
How is this BORE resistant? The Pd security model is BORE resistant for a
unique secret protected by a unique key on a given machine. Your hack on
your machine won't let you learn the secrets on my