Scott Dial writes: > 2) The circumvention requires no modification of any copyrighted > material. But does require the copying of _two bytes_ of "copyrighted" > data at a key location. So...how does it work? -- David Phillips <david@acz.org> http://david.acz.org/