As with any distributed proxy scheme, you don't control what is requested from your box over the other protocol. That's why exactly what "gateways" that proxy out to other protocols (if any) that run on your box is configurable. If you don't want to proxy, you don't have too.
On Fri, 08 Nov 2002 09:39:47 -0800 Ed Tomlinson <tomlins at cam.org> wrote: >Interesting, but I am pretty sure that I do not want this enabled >on my box. >While it is anonymous for the requestor, if I enable this, its my >box that shows >up in various logs as requesting questionable or illegal material. > > >Ed Tomlinson > Get your free encrypted email at https://www.hushmail.com _______________________________________________ devl mailing list devl at freenetproject.org http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/devl
