View Single Post
  #4  
Old November 19th 03, 07:54 PM
Robert Ehrlich
external usenet poster
 
Posts: n/a
Default

Paul Repacholi wrote:
...
If anyone is going to fabricate records, then just feed the whole
system from a pseudolite set. No need to get inside the systems at
all.
...


This is just what the cryptograhic RSA signature makes impossible,
not to fake such records, but to put them in an IGC file that the
validation program accepts as a genuine file coming from the logger.