>Stop right there. You're
overlooking the extraordinary simplicity of
>the way to determine whether a key is, or is not, in your data store. Even if so, my point was
only to have reasonable claim, before a court, that you could not remove
the 'copyrighted' chks out of your datastore because you don't know what it
looks like, with the encryption. Requesting it at htl 0 would indeed indicate
that you have it somewhere in your dir, but not where and under what name it is
stored in your datastore. Sure, if you hack into the prog or something, you
might see what corresponds to it, but hacking or encrytion-breakling will be
considered above the capabilities ('reasonable effort', is the term, I think) of
most users by the courts.
As for findley: your
whole reasoning stands or falls with the assumption a freenet-node-runner can
not fall under the same protection as classical ISPs. I can't be sure for the
USA, but in my country, courtrules have rather leaned towards the rule that, if
you deliver an online service to the public, whether you are a private
individual or a company, you have the same rights. In essense, an ISP, as the
name indicates, deklivers an internet service to others. That's exactly what
someone running a freenetnode is doing. the courts thusfar, in my country, seems
to agree.
Can you cite an example
where it is clearly demonstrated that private ppl who run a server and offer a
service, do not fall under the protection of an ISP?
Otherwise, this whole
discussion is rather academic, untill a precedent is
made.
|
_______________________________________________ chat mailing list [EMAIL PROTECTED] http://news.gmane.org/gmane.network.freenet.general