The only difference between 2 and 3 clause BSD is
the presence of the third clause. So long as you're
not doing what the third clause restricts, they're
compatible. Coordination is still prudent though.
3 clause still exists because some people (mostly legacy entities)
think endorsement and
Why you guys use JAVA for such a security concerned email client?
JAVA itself isn't secure and most relayable computers don't have
a virtual machine. You know JavaSnoop and vm-hookers like that?
Just rewrite it into plain C imho...
/jo
Gesendet: Mittwoch, 18. September 2013 um 02:26 Uhr
Von:
On 9/17/13 6:39 PM, Karsten Loesing wrote:
On 9/17/13 6:25 PM, Roger Dingledine wrote:
On Tue, Sep 17, 2013 at 11:53:15AM +0200, Karsten Loesing wrote:
Here are the three graphs just for September, all ending on the
same day:
On 9/17/13 12:02 AM, Roger Dingledine wrote:
I think it would be good to write a paragraph or two to answer Matthew's
question -- why are these new numbers different, and what makes us think
they're better? I admit I've lost track of the various user counting
approaches too.
I thought more
josef.win...@email.de ha scritto:
Why you guys use JAVA for such a security concerned email client?
JAVA itself isn't secure and most relayable computers don't have
a virtual machine. You know JavaSnoop and vm-hookers like that?
Just rewrite it into plain C imho...
/jo
JavaSnoop and
Hi Nick, Ian,
I've been pointing people to Section 6 of
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.6223; when
they ask what NTor is. But then I realized that that's not the best
(single) place to send cryptographers when I ask them to analyze whether
we've designed or built it