On 3/2/2012 9:09 AM, David Cole wrote:
At 3/2/2012 10:25 AM, Edward Jaffe wrote:
The real question is whether an unintended third party can use the code to
become authorized.
Yes. That absolutely is the "real question".
And absolutely, that is what Bill Fairchild's post asserts.
So that absolutely is why I am concerned.
The subject line of this thread started off (in the other list) as "Program
FLIH". Then, you renamed it to, "Program FLIH backdoor - This is a criminal
breach of security!" Having concerns is one thing; making speculative
accusations of criminal wrongdoing is quite another. Innocent until proven
guilty is the American way; not the other way 'round.
--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
[email protected]
http://www.phoenixsoftware.com/
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN