Comment Patent application digest (Score 1) 259
For those of you who are interested in what the patent applications are about but do not feel like sifting through them in search of actual information, I posted an analysis of the "Interdiction..." patent on the "Challenge of P2P" blog.
As an aside, and as discussed in the blog post to which I refer, what they characterize as hash spoofing does not require to break any cryptographic primitives. It merely refers to a form of false advertising.
As an aside, and as discussed in the blog post to which I refer, what they characterize as hash spoofing does not require to break any cryptographic primitives. It merely refers to a form of false advertising.