Z:gnu-www-ja-ms-doj-tunney--cca9d8-At present, all such protocols/en

At present, all such protocols and APIs are public, which is appropriate because&mdash;as computer security experts would testify if, as it should, the District Court seeks evidentiary supplementation under 15 U.S.C. 16(f)(1)&mdash;security is not attained in the computer communications field by the use of secret protocols, but rather by the use of scientifically-refereed and fully public protocols, whose security has been tested by full exposure in the scientific and engineering communities.