[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: NIST proposes software key escrow development
> Not necessarily. Zero knowledge proof techniques, for instance, can be
> applied to make source code as impenetrable as one wishes. This tends to
> carry a heavy runtime overhead, of course.
Could you go into more detail on this? Thanks!
--
Ed Carp, N7EKG erc@apple.com 510/659-9560
anon-0001@khijol.uucp
If you want magic, let go of your armor. Magic is so much stronger than
steel! -- Richard Bach, "The Bridge Across Forever"