[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Part 2: System Structure

From: Bas Wijnen
Subject: Re: Part 2: System Structure
Date: Fri, 19 May 2006 19:47:32 +0200
User-agent: Mutt/1.5.11+cvs20060403

On Fri, May 19, 2006 at 06:22:01PM +0200, Pierre THIERRY wrote:
> > We are assuming here that we have a system which allows creating
> > opaque storage and a user on it who knows this.  The program can
> > indeed not check it.
> Wait, read the sentence I'm replying to. I say the program cannot verify
> that, and it was about the program, not the user.

That's why I said "indeed". ;-)


I encourage people to send encrypted e-mail (see http://www.gnupg.org).
If you have problems reading my e-mail, use a better reader.
Please send the central message of e-mails as plain text
   in the message body, not as HTML and definitely not as MS Word.
Please do not use the MS Word format for attachments either.
For more information, see

Attachment: signature.asc
Description: Digital signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]