What's your point with that 3 word post? You vaguely mentioned "hooks" or "flags", which I didn't disagree with, then come back like I didn't bring anything new to the table - your point #3 is drastically different from an asymmetric cryptographic system where the key could only be obtained in/from the source code (or possibly from memory at just the right time - is this legally a different case???).
Stephen Luft said:As previously stated...