home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!olivea!apple!news.oc.com!convex!ewright
- From: ewright@convex.com (Edward V. Wright)
- Newsgroups: comp.sys.mac.misc
- Subject: Re: a non-techie view of Newton
- Message-ID: <ewright.711997242@convex.convex.com>
- Date: 24 Jul 92 17:00:42 GMT
- References: <0105011F.978hg5@dragon.enigami.mv.com> <7889@dirac.physics.purdue.edu>
- Sender: usenet@news.eng.convex.com (news access account)
- Organization: Engineering, CONVEX Computer Corp., Richardson, Tx., USA
- Lines: 14
- Nntp-Posting-Host: bach.convex.com
- X-Disclaimer: This message was written by a user at CONVEX Computer
- Corp. The opinions expressed are those of the user and
- not necessarily those of CONVEX.
-
- In <7889@dirac.physics.purdue.edu> sho@gibbs.physics.purdue.edu (Sho Kuwamoto) writes:
-
- >Imagine UPS already has your signature on file. (You sign
- >for something once, your signature is in their computer)
- >The operator could pop up the signature, regardless of
- >whether you had received your package or not.
-
- So, you think this is something new? You've never heard of
- forgery?
-
- Cutting and pasting a signature to another field would,
- in fact, be a ridiculously easy type of forgery to detect,
- since no individual ever signs his name exactly the same
- way twice.
-