https://github.com/scanlime/zenphoton/pull/8

It's interesting to see people try this over and over and make various
mistakes - reminds me of how secure coding guidelines are developed.
-- 
http://www.subspacefield.org/~travis/ | if spammer then [email protected]
"Computer crime, the glamor crime of the 1970s, will become in the
1980s one of the greatest sources of preventable business loss."
John M. Carroll, "Computer Security", first edition cover flap, 1977

Attachment: pgp2Fv2VHk9rX.pgp
Description: PGP signature

_______________________________________________
RNG mailing list
[email protected]
https://lists.bitrot.info/mailman/listinfo/rng

Reply via email to