> 2016/02/29 9:37、Michael Smith <[email protected]> のメール: > > The examples to which you allude fall, as far > as I know, into the category of implementation weaknesses,
And of course we have no way of actually know that. Disguising a backdoor as an implementation weakness is obviously what the security state would aim for. Jean-Christophe _______________________________________________ pen-l mailing list [email protected] https://lists.csuchico.edu/mailman/listinfo/pen-l
