As with any distributed proxy scheme, you don't control
what is requested from your box over the other protocol.  That's
why exactly what "gateways" that proxy out to other protocols 
(if any) that run on your box is configurable.  If you don't want
to proxy, you don't have too.

On Fri, 08 Nov 2002 09:39:47 -0800 Ed Tomlinson <tomlins at cam.org> wrote:
>Interesting, but I am pretty sure that I do not want this enabled 
>on my box.  
>While it is anonymous for the requestor, if I enable this, its my 
>box that shows 
>up in various logs as requesting questionable or illegal material. 
> 
>
>Ed Tomlinson
>



Get your free encrypted email at https://www.hushmail.com

_______________________________________________
devl mailing list
devl at freenetproject.org
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to