[Top] | [Contents] | [Index] | [ ? ] |
Footnotes
(1)
Using a little social engineering anyone who is able to decrypt the message can check whether one of the other recipients is the one he suspects.
[Top] | [Contents] | [Index] | [ ? ] |
This document was generated on June 29, 2014 using texi2html 5.0.