I can Imagine the Judge looking at our previous ca
Post# of 82672
There is not a single way that there is a valid relation. SA's argument consists of authentication examples outside of a cyber world. R&G's argument consists of authentication within the cyber world. Specific code written to move information in a way that is separate from the normal way to move information. IN THE CYBER WORLD. IN THE HARDWARE. IN THE SOFTWARE.
I'm trying to find a single reason that could keep this case in SA's favor. I simply cannot find one. Good morning, by the way.