on Wed, Oct 24, 2001 at 07:12:13PM -0700, John Young (jya@pipeline.com) wrote:
These procedures were described in exquisite detail during the USA v. bin Laden et al trial earlier this year:
http://cryptome.org/usa-v-ubl-dt.htm
Use the search on Cryptome to find the transcripts describing the comb attack.
http://cryptome.org/usa-v-ubl-72.htm Peace. -- Karsten M. Self <kmself@ix.netcom.com> http://kmself.home.netcom.com/ What part of "Gestalt" don't you understand? Home of the brave http://gestalt-system.sourceforge.net/ Land of the free Free Dmitry! Boycott Adobe! Repeal the DMCA! http://www.freesklyarov.org Geek for Hire http://kmself.home.netcom.com/resume.html [demime 0.97c removed an attachment of type application/pgp-signature]