> 2016/02/29 9:37、Michael Smith <[email protected]> のメール:
> 
> The examples to which you allude fall, as far 
> as I know, into the category of implementation weaknesses,

And of course we have no way of actually know that. Disguising a backdoor as an 
implementation weakness is obviously what the security state would aim for.

Jean-Christophe
_______________________________________________
pen-l mailing list
[email protected]
https://lists.csuchico.edu/mailman/listinfo/pen-l

Reply via email to