Thanks. See also EIS VIII.
Could you give an example of a case of deception that is quite unlike a trojan? Maybe we have different definitions. Maybe I’m not accounting for something. Either way, it seems useful to figure out the disagreement.
I’m slowly making my way through these, so I’ll leave you a more complete comment after I read post 8.
Thanks. See also EIS VIII.
Could you give an example of a case of deception that is quite unlike a trojan? Maybe we have different definitions. Maybe I’m not accounting for something. Either way, it seems useful to figure out the disagreement.
I’m slowly making my way through these, so I’ll leave you a more complete comment after I read post 8.