On Wed, 2 May 2001 23:31:25 +1200 "David McNab" <[EMAIL PROTECTED]>
writes:
> > D. McNab is compelled
> > to move to Colorado, where he's made to do punitive labor putting
> > "Keep this Bag Away From Small Children" onto plastic
> Piggly-Wiggly
> > bags.
>
> This is one thing that Rebirthing and Freenet have in common - they
> both
> strive to restore power to the individual, and incur wrath of
> powers-that-be
> along the way. Reaction to the Colorado incident is testament to the
> power
> of the media. Why? Because the 'therapy' used was not even
> Rebirthing - it
> was a bizarre form of psychodrama. Rebirthing encourages strong
> free
> breathing, it doesn't stifle it. To call the Colorado incident
> Rebirthing is
> like saying that Freenet is a joint project between RIAA, BSA,
> Doubleclick
> and Radiate. But, thanks to inaccurate reporting, the state of
> Colorado has
> made it an offense for anyone to recommend the use of Rebirthing,
> let alone
> administer it.
Well I know nothing about this incident or rebirthing, but I think that
you should be able to do whatever you want as long as you are not hurting
anyone else. Period. So if rebirthing is somehow harmfull to people,
which I doubt, then people should be educated about it's effects and
anyone forcing people to use or practice it should be arrested and
charged with abuse of some kind. Otherwise, leave people alone. If you
want to drive without a seat belt, stupid though it may be, go ahead. If
you die becuase of your stupidity, so much the better for the rest of the
species. If you learn from your mistake and get smarter so much the
better for the species. Forceing stupid people to not do stupid things
isn't going to work. Forcing people to do what some bigshot thinks is
smart isn't going to work either. Just leave everyone alone!!
>
> It's chilling to contemplate the devastation that could be caused by
> an
> orchestrated media campaign. Consider...
>
> "Jail Inevitable for Freenet Child Porn Hacker"
> REUTERS - Los Angeles, October 18:
> Freenet activist Fred Bloggs admitted in court today that he could
> not rule
> out the presence of child pornography on his hard disk, including
> images of
> children as young as three being sexually molested and mutilated.
Duh!!
> Counsel for the accused claimed that his client is oblivious to the
> nature
> of the files in the Freenet datastore on his disk, since the files
> are
> encrypted and he lacks the decryption keys. But on cross-examination
> by
> prosecution, Bloggs was unable to prove that he had never possessed
> the
> decryption keys.
The burden of proof is on the prosecution, not the deffendant. What they
hell is going on here?! Your not supposed to prove your innocence, they
are supposed to prove your guilt. And lack of proof against is not proof
for, or vise versa. Whatever happened to Innocent Until Proven Guilty!!!
WHAT THE HELL?!!!!!!! Lack of proof that you do not have the decryption
keys is not proof that you had or have the decryption keys. WHAT THE
HELL?!!!!!
> But what stunned legal observers was the report of a technical
> analysis of
> the accused's system. Software engineering consultants acting for
> the
> prosecution installed the accused's computer into a small Local Area
> Network
> (LAN), and installed the Freenet software with empty data stores on
> all the
> other computers.
> Upon typing a short character sequence into the other computers,
> the
Yeah right. Since when is anything on freenet a "short character
sequence"? Please, they are obviosly lying here, they are totaly
railroading this poor freenet user. ARGH!!!!!!! Even if all you want to
do is request hello.txt you have to type something like "frequest
hello.txt hello.txt" which isn't a short sequence. A short sequence
would be something like "dir" or something. And also how could you
request a whole bunch of files off of freenet with only a short character
sequence? I bet what they did is they grabbed the entire keylist from
Steve's Key List, put it all into a batch file called "get.bat" or
something and that is what they typed to show how to download all these
files.
> consultants' computers downloaded 1800 megabytes of data from the
> accused's
> system, then proceeded to show graphic movies, including one of a 5
> year old
> girl being brutally raped by several men. All members of the jury
> were
> clearly horrified as these movies were played in court.
Why do these files need to be played in court? So what if there happens
to be some really horrible crap on this guy's node.
Even if he did download these files, what proof is there that he created
these files, or that the creators of these files proffited financialy in
any way from the transfer? NONE!!!! So he might have a sick mind, so
what?! You should be able to do anything or think anything you want to
as long as you are not hurting anyone else. And I have not seen how
downloading porn hurts anyone but yourself!!! Paying for the porn is
another thing entirely. By transfering funds you would actualy be
helping to cause the abuse of the individuls depicted in the files. But
what if these files are completely computer generated?! What then? Who
is being hurt in any way shape or form by the creation or trade of such
sexualy explicit files? NO ONE!!! GRRRRAAAGH!!!!
And yes it IS possible to create a VERY realistic computer animation that
is so realistic that guys can actualy get sexualy aroused by it.
Absolutely. Computer generated animation is getting more and more
realistic and more and more complex. There are magazines today with
totaly computer generated women on their covers, and people are haveing
trouble telling the difference between the computer generated women and
real women.
> The consultants also reported that several hundred files had been
> deleted
> from the accused's system in the days leading to the arrest, and
> that it was
> clearly possible that these files, now overwritten, had contained
> decryption
> keys necessary to provide the accused with full access to the
> datastore.
How is this clearly possible? Anything is possible if you don't know
what the file is. If the files were overwriten, how did they know they
existed? Unless the data wasn't completely destroyed in the process.
Like maybe Undelete had some info about them stored somewhere. And if he
didn't know he was going be arrested for a crime, how can deleting files
be an automatic offense against the law?!! WHAT THE HELL?!! Proof of
files haveing been deleted is NOT proof that those files contained
decryption keys!!! AAAAAAAAAARGH!!!!!!!!
> Counsel for the accused objected vehemently to this manoever,
> demanding that
> these consultants reveal where they obtained the decryption keys.
This is a VERY good argument. How the hell did they supposedly download
these files? How is this proof actualy being gathered? It is more than
possible for them to very easily tamper with and even plant evidence to
support thier case. What kind of system of checks and balances is in
place to keep this from happening?!
> This
> objection was however overruled, and struck from the trial
> transcript.
> The jury is now in deliberation.
This is total crap. This is a kangaroo court and this guy is getting
railroaded!!!
I am very angry about this, as you can see.
________________________________________________________________
GET INTERNET ACCESS FROM JUNO!
Juno offers FREE or PREMIUM Internet access for less!
Join Juno today! For your FREE software, visit:
http://dl.www.juno.com/get/tagj.
_______________________________________________
Chat mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/chat