Well the reason that the common argument is illegal
pornography is because it is one of the few peices of infomation that is totaly
illegel. Everything from how to build a nuke to why you'd like to see Bush
dead is legal. But not KP, it has a very unique status. And the
reason people don't commonly argue copyright infringment as a reason is because
truthfuly no one cares but who ever is being infringed upon.
If you could prove that Earthlink, Hotmail, Verizon
knew that they were helping spread illegal infomation and failed to
act they could be help accountable.
I don't know if freenet could be cracked by some
sort of trojan. I think a bigger risk would come from your ISP. But
everything that we're talking about already assumes that freenet has been
cracked. Other wise the point is moot since they can't find you
anyway.
<[EMAIL PROTECTED]> writes:
>
> > Yes, I lost my temper, and I do apologize. > When I see a post from a DOJ address giddily claiming that one of the only > forums for international dissemination of political information, is abetting > lawbreaking because someone, somewhere, might have posted a nasty picture, > I do tend to blow a fuse. I see now that Mr Findley is using Hotmail instead, > so I can assume he is just speaking for himself, which is fine.What is quite interesting is that whenever > a free speech issue arises, it is often attacked with the claim that it > is supporting illegal pornography. I get a bit tired of this, and while > there are convictions in the U.S., I believe it has yet to stand up in > appeals court. Why can't we look at how important information can be archived > in freenet? I bet that there is at least one illegal picture somewhere > on Earthlink, Hotmail, Verizon, etc. Does that make them criminal?As to freenet being insecure, I am talking > about an issue I saw some time ago. Perhaps it has now been solved. It > is the Trojan node attack. A false freenet node whose purpose is to collect > all of the node IP addresses it can, and then piece together the documents > stored across these nodes, and the location and owner of each node. By > acting like a freenet node, the Trojan is able to slowly creep through > the network, one node at a time.Once this is done, and the information > pieced together, a well funded organization can break open the documents > with a few days of parallel cracking.Am I way off base here? > Jeff Furgal > > _______________________________________________ > chat mailing list > [EMAIL PROTECTED] > http://news.gmane.org/gmane.network.freenet.general |
_______________________________________________ chat mailing list [EMAIL PROTECTED] http://news.gmane.org/gmane.network.freenet.general