From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 In-Reply-To: <4C295A3E.30403@authentrus.com> References: <4C295A3E.30403@authentrus.com> From: Stanley Lieber Date: Mon, 28 Jun 2010 21:46:31 -0500 Message-ID: To: Fans of the OS Plan 9 from Bell Labs <9fans@9fans.net> Content-Type: text/plain; charset=UTF-8 Subject: Re: [9fans] offered without comment or judgement Topicbox-Message-UUID: 381c5ed2-ead6-11e9-9d60-3106f5b1d025 On Mon, Jun 28, 2010 at 9:28 PM, Wes Kussmaul wrote: > ron minnich wrote: >> >> >> https://www.signup4.net/UPLOAD/STRA10A/DARP31E/CRASH%20Proposer%20Day%20v2.pdf >> > > Innate or adaptive, it's all based upon the flawed premise that it's > possible to determine the intentions of the sender of a stream of bits. It > is not possible to determine the intentions of the sender of a stream of > bits. > > This is the pointless electronic countermeasures race all over again. > > The solution was well developed, then obscured by the telephone century. > http://quietenjoyment.net/slides2j.swf > > Wes Kussmaul > > -- > Learn about The Authenticity Economy at > http://video.google.com/videoplay?docid=-1419344994607129684&hl=en# Anywhere legitimate identification is used, legitimate identification can be purchased. -sl