http://www.w3.org/ns/prov#value | - Finally a somewhat funny example: If not commercial factors but security is a priority you might gain considerable advantage by simply a) not using built in security instructions (PRGs, AES, etc.) and b) have *non-optimized* routines with slight unnecessary code portions so as to avoid relevant code being auto-detected as e.g. Ah, OK, he is the PRG (and such attacked/tainted/...).
|