10:08:17ShinmeraIt's stealth because it doesn't appear in the victim's definition source code
10:08:51ShinmeraVery useful if you want to extend a protocol to a class you don't control.
10:09:16beachno-defun-allowed: As a matter of fact, the paper on stealth mixins was accepted at a conference in Melbourne and I was there to present it.
10:14:10beachI was living in Auckland when we submitted the paper, but I was back in France when the conference took place, so I had to go halfway around the world just to present the paper. My coauthor, Johh Hamer, lived in Auckland, but refused to go.