Quote:
Originally Posted by jęd
4. Use weak encryption to so the majority don't know how to break it, but the technically literate can. See iTunes for a working example...
|
Which means that the technically literate remote the encryption and post it for everyone to download for free.
Technically option #2.
Quote:
Originally Posted by jęd
See the history books for reasons why this doesn't tend to work...
|
As I said, the theory has problems.