I know I tend to sit in the back row and ignore what's going on down front most of the time but I have a few questions/comments about "Microsoft's bounty
- Given that the author already knows how to break into computers, what's to stop him/her from chosing another programmer and planting the "evidence" on that person's computer before calling the cops?
- Where is all this bounty money coming from? (If you can't guess the obvious answer, e-mail "firstname.lastname@example.org" with a subject line of "obvious answer" (without the quotes)(an infobot will answer).
Post a Comment