Continuing the discussion...
TrackBack URL for this entry:
https://financialcryptography.com/cgi-bin/mt/mt-tb.cgi/482
Listed below are links to weblogs that reference
'Industrial Espionage using Trojan horses'
from
Financial Cryptography
.