On Friday, August 31, 2001, at 01:27 PM, Faustine wrote:

> On Friday, August 31, 2001, at 11:43 AM, Faustine wrote:
>> Tim wrote:
>>> But, as with Kirchoff's point, the attacker is going to get the design
>>> eventually.
>> If getting the design "eventually" were good enough, why the keen
>> interest in putting in a large order for the beta? There's a reason.
>> Perhaps the NSA wanted to use the product without making illegal 
>> copies?
>> Your earlier point (that they wished to reverse-engineer the product) 
>> is in fact undermined by this fact that they bought N copies.
>
> Unless you believe reverse engineering is only useful for making pirated
> copies, there's no reason to assume any sort of contradiction at all.
>
> As if the NSA would use anything from the private sector they didn't 
> know inside out.

>Consistent with your misconception about big computers being useful for 
>brute-force cryptanalyis,

I never said that and you know it. Nice troll, though. 


> it appears you also believe the myth about the 
>mighty NSA knowing more than the private sector.
>You _really_ need to get an education on these matters.


Are you actually claiming NSA implements COTS technology completely 
straight off-the-shelf? And what do any of these "you poopy head 
whippersnapper" comments have to do with the fact that you found a 
contradiction where there was none? 

Boss Tom Turkey in full strut.


~Faustine.

Reply via email to