Here. I haven't read it yet, though will teach a seminar on it next year with Martha Nussbaum. Reactions from readers who have? Signed comments only.
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply to Jeff McMahan Cancel reply