On 28/4/09 14:54, Story Henry wrote: > Just to remind people in this discussion: Jeremy Carroll's algorithm > does work with blank nodes. So I don't think the blank node discussion is appropriate > here. Yes, it has some clever techniques that work with bnodes sometimes, often, usually. Those are not the kinds of property of an algorithm that endear it to use in a security context. Jeremy himself said earlier in this thread that signing the source text is more appropriate to the current problem space, and I'd like to stick with that conclusion and move on! cheers, DanReceived on Tuesday, 28 April 2009 12:57:45 UTC
This archive was generated by hypermail 2.4.0 : Tuesday, 5 July 2022 08:45:11 UTC