lua-users home
lua-l archive

[Date Prev][Date Next][Thread Prev][Thread Next] [Date Index] [Thread Index]


On Fri, Mar 19, 2010 at 3:59 AM, Javier Guerra Giraldez
<javier@guerrag.com> wrote:
>
> the novelty of this off-system is to use other data chunks as the pad.
>  it's a clever twist, but it's just encryption.
>
> and, of course, none of this matters to a lawyer. in their worldview
> the fact remains that  "you didn't buy it, but you have it now, so you
> stole it"
>
> --
> Javier
>

you cannot prove that someone has it now.
what is it ? all blocks? how will you prove that, if a block has
multiple menaings?
if "it" is the off url, yes, then you still ned to show, that this key
is used to re-transform the blocks again,
you do this locally on localhost.
There is no evidence, a) that you have all blocks, that you use the
right offurl, that you restored the files, that you made out of one
block the accused meaning.