The ability to change locators while a communication is being held introduces security problems, so mechanisms based on applying cryptography to the address generation process ( Cryptographically Generated Addresses, CGA ), or on bounding the addresses to the prefixes assigned to a host through hash-based addresses were defined.
12.
The adders work on one binary digit at a time, and even the instruction word was designed to minimize the number of bits in an instruction that needed to be retained in flip-flops ( to the extent of leveraging another one-word drum line used exclusively for generating address timing signals ).
13.
A true test would be to use randomly generated addresses and then with half of them you click ( well more likely you'd just get a comp program to do it ) and with half of them you don't click and compare the amount of spam talk ) 12 : 43, 27 April 2009 ( UTC)