>Stop right there.  You're overlooking the extraordinary simplicity of
>the way to determine whether a key is, or is not, in your data store.
 
Even if so, my point was only to have reasonable claim, before a court, that you could not remove the 'copyrighted' chks out of your datastore because you don't know what it looks like, with the encryption. Requesting it at htl 0 would indeed indicate that you have it somewhere in your dir, but not where and under what name it is stored in your datastore. Sure, if you hack into the prog or something, you might see what corresponds to it, but hacking or encrytion-breakling will be considered above the capabilities ('reasonable effort', is the term, I think) of most users by the courts.
 
As for findley: your whole reasoning stands or falls with the assumption a freenet-node-runner can not fall under the same protection as classical ISPs. I can't be sure for the USA, but in my country, courtrules have rather leaned towards the rule that, if you deliver an online service to the public, whether you are a private individual or a company, you have the same rights. In essense, an ISP, as the name indicates, deklivers an internet service to others. That's exactly what someone running a freenetnode is doing. the courts thusfar, in my country, seems to agree.
 
Can you cite an example where it is clearly demonstrated that private ppl who run a server and offer a service, do not fall under the protection of an ISP?
 
Otherwise, this whole discussion is rather academic, untill a precedent is made.
_______________________________________________
chat mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.general

Reply via email to