OT Extracting code from chips, deompiling

On 19/12/2018 21:41, Diesel (Dustin Cook) threatens David B.

I sincerely hope you think I'm bluffing and do absolutely nothing
with the clear evidence all over your blog that supports my
complaint. Along with email correspondence I retained between myself,
google, youtube, vimeo and imgur (You've got several valid dmcas
against you with imgur, I'm sure you know that already though), I've
got you dead to rights this time around, and this time, David, I'm not
going to let you go to rejoin the swarm. This time, you're coming
onboard to be processed into food.

You once told me that you don't MAKE threats, Dustin.

Shall I add this one to my Blog?

One small point about taking down items. Can you remove them from an
'alt' Usenet newsgroup, where I've already put them for safe keeping?

--
Regards,
David B.

https://vxer.home.blog/2018/12/08/vxer-a-profile/
 
On 19/12/2018 10:53, Shadow wrote:
On Tue, 18 Dec 2018 22:12:51 +0000, "David B." <"David
B"@nomail.afraid.org> wrote:

Phil might
be interested to view this finding too:-

Message-ID: <vGx6B.191110$rM3.164669@fx17.fr7

The website details found in the Source Code of the Tekrider site, when
followed, go to a website which, when submitted to Virus total show that
said site *IS* infected.

https://www.virustotal.com/#/url/42cbd72a208a75cd3526fc7fce3e3b4d7ddac2c55a78694434ad69416d2992ad/detection

Co-incidence? I don't know.

Final URL
http://detail-cc.cc/check_availability.php?s=windows-web-browsers
Serving IP Address
199.59.242.151
Status Code
200
Body Length
3.84 KB
Body SHA-256
f7853b4ad6d9a012677e6a492443a13152e1733ff5ec601caac634367edcdc11
Headers
connection: keep-alive
content-type: text/html; charset=UTF-8
date: Wed, 19 Dec 2018 22:24:13 GMT
server: openresty
transfer-encoding: chunked
x-adblock-key:
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvb

--
Regards,
David B.
 
"David B." <"David B"@nomail.afraid.org>
news:I2dSD.137821$sG.30451@fx16.fr7 Tue, 18 Dec 2018 20:48:35 GMT in
alt.computer.workshop, wrote:

[snip]

Then WOT must be incorrect.
Here's visual proof that the site DID house malware:-

https://www.dropbox.com/s/6nj382qhv4wzmju/Tekrider.net%20-%20Infect
ed%20with%20malware%20%28Sucuri%29.tiff?dl=0

Liar. Your visual proof is a known sucuri false positive; that you
were told a considerable amount about the first time you made this
accusation. You knew the second you wrote that reply that you were
spreading false and misleading information, David.

I've little doubt that Phil will be able to look after himself.

Have you sent him an email asking him to crack a site for
you
yet ? And threatened to report him for pedo porn if he doesn't,
or haven't you got through the usual foreplay yet ?
[]'s

No. You may twist things, Shadow, but you'll never change the
truth.

He didn't twist anything, David. The only thing you haven't
threatened me with in those examples is the pedo porn, despite
'jokingly' (I don't believe you) accusing me of having it at one
point. Since it's a pretty serious accusation and I didn't take it
mildly, you quickly tried to back peddle away from it. you don't joke
about things like that, David. You just don't.

You've been helping the Devil to do his work and that will not be
forgotten.

Oh please, you've been the devils right hand (in more than one way)
for sometime now. Under the guise of a good guy. Except, that, unlike
the devil, you're having a hell of a time selling the bullshit story.

Which is why I consider it to be my civic duty to warn others about
you, so that they may not have to know you in the way in which myself
and BTS do. Amongst other victims along your path of destruction.

Don't become the next David Brooks cyberstalking victim!
Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT)
to learn more. If you've already become a victim or know someone who
has, you can provide the following information to them, your lawyer,
local law enforcement, etc.
https://www.devon-cornwall.police.uk - His local police. Report?
David Brooks (BoaterDave)
Jersey Cottage 86 Granary Lane
Budleigh Salterton Devon EX9 6ER United Kingdom
Phone: 44-1395-443340 (H) 07974-193550 (M)
Email(s): davidandtrishab@btinternet.com, boaterdavetj@aol.com


--
Don't become the next David Brooks cyberstalking victim!
Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT)
to learn more. If you've already become a victim or know someone who
has, you can provide the following information to them, your lawyer,
local law enforcement, etc.
https://www.devon-cornwall.police.uk - His local police. Report?
David Brooks (BoaterDave)
Jersey Cottage 86 Granary Lane
Budleigh Salterton Devon EX9 6ER United Kingdom
Phone: 44-1395-443340 (H) 07974-193550 (M)
Email(s): davidandtrishab@btinternet.com, boaterdavetj@aol.com
 
"David B." <"David B"@nomail.afraid.org> news:HheSD.7$n84.2@fx01.fr7
Tue, 18 Dec 2018 22:12:51 GMT in alt.computer.workshop, wrote:

Well, the drinking the wine part might be possible.

You don't have to Prove you are a cretin, Shadow.

He wasn't. But, you've proven yourself to be every bit the stalker
I've stated you were on more than one occasion.

Javascript is NOT malware, per se.

No one ever explaine why that Javascript was ON the website. Phile
might be interested to view this finding too:-

It never was.

https://www.dropbox.com/s/7lnpy4pez26jlta/Tekrider%20URL%20-%20Java
script%20site.jpeg?dl=0

You accused the site owner of hosting malware on 8
newsgroups,
but only apologized on 2 when Sucuri admitted it made a mistake
because of the hosts file. That was almost 2 years ago. A
lifetime for your drunken memory.

If I'm wrong, post a DIRECT link to the Sucuri analysis.

https://sitecheck.sucuri.net/results/tekrider.net

The malware was quickly removed to save embarassment - the site
owner WAS once a professional and SHOULD have been more careful.
:-(

That's another, lie, David. The malware in question was NEVER on the
site to begin with. It was a false positive on the part of sucuri and
you were told that the first time you made the accusation. And the
second, and the third. You finally stopped (evidently only
temporarily) when more people shared additional urls also pointing
out the FALSE POSITIVE on the part of sucuri.

And, it should also be stated, that the piece of code you shared is
not in any possible way, malware; and you were told that too, at the
time you originally claimed it to be.

Infact, you acknowledged it:

Message-ID: <vGx6B.191110$rM3.164669@fx17.fr7>

On Mon, 3 Jul 2017 21:20:42 +0100, "David B."
<David_B@nomail.afraid.org> wrote:


OK - I'll accept that the 'code' is NOT actually malware ...... but
it WAS shown in the source code of BTS's www.Tekrider.net site.

It was 'shown' when sucuri injected it, falsely, in order to sell you
(it thought you were a site administrator) on a security package.
And, you've been told that too.

I don't mind him stalking me, just as you do. Maybe you'll explain
why YOU propogate his website yet he does not? Has anybody ever
suggested that you may be one and the same entity?

Nobody is stalking you, David. YOU have been stalking people for
years and you've been caught doing it, many times. It's only recently
that enough has become enough and people are not only being warned
about you, but provided information they can use to protect
themselves from you as well as bring charges against you in the event
you've wronged them. You're no longer able to hide and try to ruin
people without having to answer for it, David. Your cover is blown:

Don't become the next David Brooks cyberstalking victim!
Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT)
to learn more. If you've already become a victim or know someone who
has, you can provide the following information to them, your lawyer,
local law enforcement, etc.
https://www.devon-cornwall.police.uk - His local police. Report?
David Brooks (BoaterDave)
Jersey Cottage 86 Granary Lane
Budleigh Salterton Devon EX9 6ER United Kingdom
Phone: 44-1395-443340 (H) 07974-193550 (M)
Email(s): davidandtrishab@btinternet.com, boaterdavetj@aol.com



--
Don't become the next David Brooks cyberstalking victim!
Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT)
to learn more. If you've already become a victim or know someone who
has, you can provide the following information to them, your lawyer,
local law enforcement, etc.
https://www.devon-cornwall.police.uk - His local police. Report?
David Brooks (BoaterDave)
Jersey Cottage 86 Granary Lane
Budleigh Salterton Devon EX9 6ER United Kingdom
Phone: 44-1395-443340 (H) 07974-193550 (M)
Email(s): davidandtrishab@btinternet.com, boaterdavetj@aol.com
 
Thanks for the detailed answer. I changed the letter I was in the
middle of writing and just left out what related to that. And I know
for the future.

In alt.home.repair, on Tue, 18 Dec 2018 12:04:17 -0500, Phil Hobbs
<pcdhSpamMeSenseless@electrooptical.net> wrote:

On 12/18/18 11:48 AM, micky wrote:
OT Extracting code from chips, deompiling


What is the current status of things.

1) Primarily, if a chip has computer code burned into it, can the code
be retrieved by someone in possession of the chip?**

Usually. If the code protection modes aren't enabled, you can just read
it back over the JTAG connector.


2) Assuming the answer to 1 is yes, what is the state of decompiling?
Without the comments and data types, how often can the logic or the
exact pre-compiled code be determined well enough to make one's own
devices?

Dunno. If you have the binary, you can disassemble it, for sure.


**Related to this, 3) can the circuity in an IC or LSIC, intergrated
circuit or iirc large scale integrated circuit, be determined by
disassembling the IC?

Yes. There are outfits that specialize in decapping ICs and producing
transistor-level schematics, including estimated transistor
characteristics from doping profiles, area, and so on. It's a very
mainstream thing to do, but it costs a lot so you don't do it for niche
products.

IIRC they can also read out the flash by probing the decapped chip.


Is stealing design secrets harder than when everything was mechanical?
Much harder? Impossible?

Mechanical parts can have all sorts of secrets, e.g. for metals, cold
working, heat treatment, surface modification (case hardening or
metalliding), powder metallurgy and hot isostatic pressing (HIPping).

Cheers

Phil Hobbs
 
On 12/18/2018 12:17 PM, Phil Hobbs wrote:
On 12/18/18 11:57 AM, Terry Schwartz wrote:


On Tuesday, December 18, 2018 at 10:48:32 AM UTC-6, micky wrote:
OT Extracting code from chips, deompiling


What is the current status of things.

1) Primarily, if a chip has computer code burned into it, can the code
be retrieved by someone in possession of the chip?**

2) Assuming the answer to 1 is yes, what is the state of decompiling?
Without the comments and data types, how often can the logic or the
exact pre-compiled code be determined well enough to make one's own
devices?

**Related to this, 3) can the circuity in an IC or LSIC, intergrated
circuit or iirc large scale integrated circuit, be determined by
disassembling the IC?

Is stealing design secrets harder than when everything was mechanical?
Much harder?  Impossible?

(Top posting fixed)

That's a big question. Some chips have built in security and some are
wide open, depends on the programmer and the chips capabilities.

Decompiling is another matter. While it may be possible to extract
the code in some cases, it may not be useful once you have it.

Reverse engineering a chip by disassembling the chip itself would be
near impossible for Joe Average. Maybe the NSA can do it with
sophisticated tools.

Finally... theft of intellectual property is still theft.

Reverse engineering is legal everywhere AFAIK.  It doesn't get you
around patents or copyrights, but any trade secret that can be
discovered by examining an article offered for sale is no longer a trade
secret.  That includes the ideas in the binary, but not their
expression, i.e. the binary itself, which is copyrighted.

Cheers

Phil Hobbs

Except in the case if you've implicitly or explicitly agreed to a EULA
when you purchase the hardware or software that prohibits you from doing
any kind of de-compilation or reverse engineering, then you've breached
your contract and all bets are off.

I'm pretty sure there are some e.g. video game systems where the
language is such that simply by opening the box and using the product
you wave all reverse engineering rights to extracting, de-compiling, or
modifying the hardware or software.

LTSpice's EULA for example prohibits "de-compiling or modifying" their
binaries or device models, whether that includes somehow decrypting
their just-encrypted device models to examine them I don't know, the act
of simply de-crypting a file isn't decompiling anything and you're not
modifying the model itself.
 
On 12/22/2018 03:08 AM, bitrex wrote:
On 12/18/2018 12:17 PM, Phil Hobbs wrote:
On 12/18/18 11:57 AM, Terry Schwartz wrote:


On Tuesday, December 18, 2018 at 10:48:32 AM UTC-6, micky wrote:
OT Extracting code from chips, deompiling


What is the current status of things.

1) Primarily, if a chip has computer code burned into it, can the code
be retrieved by someone in possession of the chip?**

2) Assuming the answer to 1 is yes, what is the state of decompiling?
Without the comments and data types, how often can the logic or the
exact pre-compiled code be determined well enough to make one's own
devices?

**Related to this, 3) can the circuity in an IC or LSIC, intergrated
circuit or iirc large scale integrated circuit, be determined by
disassembling the IC?

Is stealing design secrets harder than when everything was mechanical?
Much harder?  Impossible?

(Top posting fixed)

 > That's a big question. Some chips have built in security and some
are wide open, depends on the programmer and the chips capabilities.
 
 > Decompiling is another matter. While it may be possible to extract
the code in some cases, it may not be useful once you have it.
 
 > Reverse engineering a chip by disassembling the chip itself would
be near impossible for Joe Average. Maybe the NSA can do it with
sophisticated tools.
 
 > Finally... theft of intellectual property is still theft.

Reverse engineering is legal everywhere AFAIK.  It doesn't get you
around patents or copyrights, but any trade secret that can be
discovered by examining an article offered for sale is no longer a
trade secret.  That includes the ideas in the binary, but not their
expression, i.e. the binary itself, which is copyrighted.

Cheers

Phil Hobbs


Except in the case if you've implicitly or explicitly agreed to a EULA
when you purchase the hardware or software that prohibits you from doing
any kind of de-compilation or reverse engineering, then you've breached
your contract and all bets are off.

I'm pretty sure there are some e.g. video game systems where the
language is such that simply by opening the box and using the product
you wave all reverse engineering rights to extracting, de-compiling, or
modifying the hardware or software.

To what degree any of that is actually Constitutional I'm not sure
either, the NFL seems to have for a long time been getting away with
putting language in their telecasts and ticket sales that it's against
your "user contract" to even publish a written description of events you
saw with your own eyes on an NFL TV broadcast or at an NFL game.
 
On 12/22/18 3:08 AM, bitrex wrote:
On 12/18/2018 12:17 PM, Phil Hobbs wrote:
On 12/18/18 11:57 AM, Terry Schwartz wrote:


On Tuesday, December 18, 2018 at 10:48:32 AM UTC-6, micky wrote:
OT Extracting code from chips, deompiling


What is the current status of things.

1) Primarily, if a chip has computer code burned into it, can the code
be retrieved by someone in possession of the chip?**

2) Assuming the answer to 1 is yes, what is the state of decompiling?
Without the comments and data types, how often can the logic or the
exact pre-compiled code be determined well enough to make one's own
devices?

**Related to this, 3) can the circuity in an IC or LSIC, intergrated
circuit or iirc large scale integrated circuit, be determined by
disassembling the IC?

Is stealing design secrets harder than when everything was mechanical?
Much harder?  Impossible?

(Top posting fixed)

 > That's a big question. Some chips have built in security and some
are wide open, depends on the programmer and the chips capabilities.
 
 > Decompiling is another matter. While it may be possible to extract
the code in some cases, it may not be useful once you have it.
 
 > Reverse engineering a chip by disassembling the chip itself would
be near impossible for Joe Average. Maybe the NSA can do it with
sophisticated tools.
 
 > Finally... theft of intellectual property is still theft.

Reverse engineering is legal everywhere AFAIK.  It doesn't get you
around patents or copyrights, but any trade secret that can be
discovered by examining an article offered for sale is no longer a
trade secret.  That includes the ideas in the binary, but not their
expression, i.e. the binary itself, which is copyrighted.

Cheers

Phil Hobbs


Except in the case if you've implicitly or explicitly agreed to a EULA
when you purchase the hardware or software that prohibits you from doing
any kind of de-compilation or reverse engineering, then you've breached
your contract and all bets are off.

I'm pretty sure there are some e.g. video game systems where the
language is such that simply by opening the box and using the product
you wave all reverse engineering rights to extracting, de-compiling, or
modifying the hardware or software.

LTSpice's EULA for example prohibits "de-compiling or modifying" their
binaries or device models, whether that includes somehow decrypting
their just-encrypted device models to examine them I don't know, the act
of simply de-crypting a file isn't decompiling anything and you're not
modifying the model itself.

You can write a contract pretty well any way you like. It's pretty
tough to enforce a hardware EULA on something you bought at a tag sale
though. ;)

Cheers

Phil Hobbs


--
Dr Philip C D Hobbs
Principal Consultant
ElectroOptical Innovations LLC
Optics, Electro-optics, Photonics, Analog Electronics

160 North State Road #203
Briarcliff Manor NY 10510

hobbs at electrooptical dot net
http://electrooptical.net
 
On 12/22/2018 01:37 PM, Phil Hobbs wrote:
On 12/22/18 3:08 AM, bitrex wrote:
On 12/18/2018 12:17 PM, Phil Hobbs wrote:
On 12/18/18 11:57 AM, Terry Schwartz wrote:


On Tuesday, December 18, 2018 at 10:48:32 AM UTC-6, micky wrote:
OT Extracting code from chips, deompiling


What is the current status of things.

1) Primarily, if a chip has computer code burned into it, can the code
be retrieved by someone in possession of the chip?**

2) Assuming the answer to 1 is yes, what is the state of decompiling?
Without the comments and data types, how often can the logic or the
exact pre-compiled code be determined well enough to make one's own
devices?

**Related to this, 3) can the circuity in an IC or LSIC, intergrated
circuit or iirc large scale integrated circuit, be determined by
disassembling the IC?

Is stealing design secrets harder than when everything was mechanical?
Much harder?  Impossible?

(Top posting fixed)

 > That's a big question. Some chips have built in security and some
are wide open, depends on the programmer and the chips capabilities.
 
 > Decompiling is another matter. While it may be possible to extract
the code in some cases, it may not be useful once you have it.
 
 > Reverse engineering a chip by disassembling the chip itself would
be near impossible for Joe Average. Maybe the NSA can do it with
sophisticated tools.
 
 > Finally... theft of intellectual property is still theft.

Reverse engineering is legal everywhere AFAIK.  It doesn't get you
around patents or copyrights, but any trade secret that can be
discovered by examining an article offered for sale is no longer a
trade secret.  That includes the ideas in the binary, but not their
expression, i.e. the binary itself, which is copyrighted.

Cheers

Phil Hobbs


Except in the case if you've implicitly or explicitly agreed to a EULA
when you purchase the hardware or software that prohibits you from
doing any kind of de-compilation or reverse engineering, then you've
breached your contract and all bets are off.

I'm pretty sure there are some e.g. video game systems where the
language is such that simply by opening the box and using the product
you wave all reverse engineering rights to extracting, de-compiling,
or modifying the hardware or software.

LTSpice's EULA for example prohibits "de-compiling or modifying" their
binaries or device models, whether that includes somehow decrypting
their just-encrypted device models to examine them I don't know, the
act of simply de-crypting a file isn't decompiling anything and you're
not modifying the model itself.

You can write a contract pretty well any way you like.  It's pretty
tough to enforce a hardware EULA on something you bought at a tag sale
though. ;)

Cheers

Phil Hobbs

At least for usage as opposed to dis-assembling the hardware the way
some consumer manufacturers deal with the problem of used sales is their
widget requires an Internet connection and user account to operate; it's
a brick unless it can connect to the Internet and self-validate that it
hasn't been mucked with and the secondhand user also signs off on all
the stuff that the original owner did.

Not uncommon nowatimes for software distributors to only allow software
to be downloaded to a machine that has an Internet connection using a
special installer, keyed to the hardware configuration of the machine
and run on that particular machine. If you want to install on a machine
with no Internet connection, or download on a machine with a faster
connection and transfer you're out of luck. If your hardware
configuration changes whether you're out of luck or not depends on if
the software-seller feels generous
 
On 12/22/18 6:01 PM, bitrex wrote:
On 12/22/2018 01:37 PM, Phil Hobbs wrote:
On 12/22/18 3:08 AM, bitrex wrote:
On 12/18/2018 12:17 PM, Phil Hobbs wrote:
On 12/18/18 11:57 AM, Terry Schwartz wrote:


On Tuesday, December 18, 2018 at 10:48:32 AM UTC-6, micky wrote:
OT Extracting code from chips, deompiling


What is the current status of things.

1) Primarily, if a chip has computer code burned into it, can the
code
be retrieved by someone in possession of the chip?**

2) Assuming the answer to 1 is yes, what is the state of decompiling?
Without the comments and data types, how often can the logic or the
exact pre-compiled code be determined well enough to make one's own
devices?

**Related to this, 3) can the circuity in an IC or LSIC, intergrated
circuit or iirc large scale integrated circuit, be determined by
disassembling the IC?

Is stealing design secrets harder than when everything was
mechanical?
Much harder?  Impossible?

(Top posting fixed)

 > That's a big question. Some chips have built in security and some
are wide open, depends on the programmer and the chips capabilities.
 
 > Decompiling is another matter. While it may be possible to
extract the code in some cases, it may not be useful once you have it.
 
 > Reverse engineering a chip by disassembling the chip itself would
be near impossible for Joe Average. Maybe the NSA can do it with
sophisticated tools.
 
 > Finally... theft of intellectual property is still theft.

Reverse engineering is legal everywhere AFAIK.  It doesn't get you
around patents or copyrights, but any trade secret that can be
discovered by examining an article offered for sale is no longer a
trade secret.  That includes the ideas in the binary, but not their
expression, i.e. the binary itself, which is copyrighted.

Cheers

Phil Hobbs


Except in the case if you've implicitly or explicitly agreed to a
EULA when you purchase the hardware or software that prohibits you
from doing any kind of de-compilation or reverse engineering, then
you've breached your contract and all bets are off.

I'm pretty sure there are some e.g. video game systems where the
language is such that simply by opening the box and using the product
you wave all reverse engineering rights to extracting, de-compiling,
or modifying the hardware or software.

LTSpice's EULA for example prohibits "de-compiling or modifying"
their binaries or device models, whether that includes somehow
decrypting their just-encrypted device models to examine them I don't
know, the act of simply de-crypting a file isn't decompiling anything
and you're not modifying the model itself.

You can write a contract pretty well any way you like.  It's pretty
tough to enforce a hardware EULA on something you bought at a tag sale
though. ;)

Cheers

Phil Hobbs



At least for usage as opposed to dis-assembling the hardware the way
some consumer manufacturers deal with the problem of used sales is their
widget requires an Internet connection and user account to operate; it's
a brick unless it can connect to the Internet and self-validate that it
hasn't been mucked with and the secondhand user also signs off on all
the stuff that the original owner did.

Good luck doing that after decapping the flash and reading it out via
SEM. ;)

Cheers

Phil Hobbs

--
Dr Philip C D Hobbs
Principal Consultant
ElectroOptical Innovations LLC / Hobbs ElectroOptics
Optics, Electro-optics, Photonics, Analog Electronics
Briarcliff Manor NY 10510

http://electrooptical.net
http://hobbs-eo.com
 
On 19/12/2018 07:00, David B. wrote:
On 18/12/2018 18:48, Phil Hobbs wrote:
SNIP
Fourth, I'm a Christian, so there's nothing very important that any
temporal power can do to me anyway.  (They can make life temporarily
unpleasant, of course.)

Cheers

Phil Hobbs


Can you relate to this, Phil?

https://www.poetryfoundation.org/poems/46473/if---

Did you ever listen, Phil?

--
David B.
Devon, UK
 
On 6/9/19 7:38 AM, David B. wrote:
On 19/12/2018 07:00, David B. wrote:
On 18/12/2018 18:48, Phil Hobbs wrote:
SNIP
Fourth, I'm a Christian, so there's nothing very important that any
temporal power can do to me anyway.  (They can make life temporarily
unpleasant, of course.)

Cheers

Phil Hobbs


Can you relate to this, Phil?

https://www.poetryfoundation.org/poems/46473/if---

Did you ever listen, Phil?

I've known that poem since I was a school child. Courage is not just
one of the virtues, it's what enables us to exercise all the others.

Cheers

Phil Hobbs

--
Dr Philip C D Hobbs
Principal Consultant
ElectroOptical Innovations LLC / Hobbs ElectroOptics
Optics, Electro-optics, Photonics, Analog Electronics
Briarcliff Manor NY 10510

http://electrooptical.net
http://hobbs-eo.com
 
On 09/06/2019 21:54, Phil Hobbs wrote:
On 6/9/19 7:38 AM, David B. wrote:
On 19/12/2018 07:00, David B. wrote:
On 18/12/2018 18:48, Phil Hobbs wrote:
SNIP
Fourth, I'm a Christian, so there's nothing very important that any
temporal power can do to me anyway.  (They can make life temporarily
unpleasant, of course.)

Cheers

Phil Hobbs


Can you relate to this, Phil?

https://www.poetryfoundation.org/poems/46473/if---

Did you ever listen, Phil?


I've known that poem since I was a school child.  Courage is not just
one of the virtues, it's what enables us to exercise all the others.

Cheers

I am in no way surprised by your answer, Phil! :)

Thank you.

--
David B.
Devon, UK
 

Welcome to EDABoard.com

Sponsor

Back
Top