> However I do agree that a malicious agent could theoretically connect for >hours on > end (say when you're sleeping) and cause some financial damage. What about the fact that in the spec it says the application manager (the JAM) is separate from the KVM and therefore can't be controlled from an application? (No automatic i-app loading, running or renewal via the network?) David JCI Tokyo [ Did you check the archives? http://www.appelsiini.net/keitai-l/ ]Received on Mon Jan 22 04:27:32 2001