sorry for breaking the threading, I was going to stay out of this, but 
something that was posted has been nagging at me.

someone commented that the problem was just the initial breech, after that 
it's just data to be served.

the problem with this is that even though the data has been leaked, that 
doesn't mean that it's public domain data. Hosting the data and passing it 
on is (or at least has the flavor of) 'trafficing in stolden merchandise'

What makes leaded data 'Ok' to host and pass on, but unauthorized copies 
of commercial software, books, music, etc 'Piracy'?


David Lang
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to