[Top] | [Contents] | [Index] | [ ? ] |
Footnotes
(1)
Using a little social engineering anyone who is able to decrypt the message can check whether one of the other recipients is the one he suspects.
[Top] | [Contents] | [Index] | [ ? ] |
This document was generated on February 1, 2012 using texi2html 5.0.