Quote:
Originally Posted by darryl
As others have said, one should assume that there is some identifying information which survives DRM and even format conversion. Even if you were to take the trouble of converting to plain ascii text and painstakingly review the file you could still not be certain. There are so many different techniques developed over many years to detect the source of leaked versions which have potential application. For instance, circulating a paper using different words or phrases in different places so as to make each unique. This would not be detectable even theoretically without other copies of the work to test against. Even then it may prove difficult. And this is but one approach.
|
Exactly! Post #7 isn't just me being paranoid!