> If the legal attacker isn't going to play by the rules (i.e. no entrapment), > then you don't have a chance. 'They' could make a plausible case that running > a Freenet node is conspiring to duplicate any content that happens to be on > Freenet, even if they can't actually access your node. Not playing by the rules is precisely why we brought up rejecting unknown connections. If they played by the rules then I think we've already got them pretty much under control. _______________________________________________ Freenet-dev mailing list [EMAIL PROTECTED] http://lists.sourceforge.net/mailman/listinfo/freenet-dev
- Re: [Freenet-dev] Don't Tal... Mr . Bad
- Re: [Freenet-dev] Don't Tal... Scott Gregory Miller
- Re: [Freenet-dev] Don't Tal... Oskar Sandberg
- Re: [Freenet-dev] Don't Tal... Ian Clarke
- Re: [Freenet-dev] Don't Tal... Timm Murray
- Re: [Freenet-dev] Don't Talk To Strangers Chris Anderson
- RE: [Freenet-dev] Don't Talk To Strangers Benjamin Coates
- RE: [Freenet-dev] Don't Talk To Strangers Benjamin Coates
- RE: [Freenet-dev] Don't Talk To Strangers Scott Gregory Miller
- RE: [Freenet-dev] Don't Talk To Strangers Brandon
- RE: [Freenet-dev] Don't Talk To Strangers Benjamin Coates
- Re: [Freenet-dev] Don't Talk To Strangers Timm Murray
- Re: [Freenet-dev] Don't Talk To Strangers Timm Murray
- Re: [Freenet-dev] Don't Talk To Strangers Timm Murray
- Re: [Freenet-dev] Don't Talk To Strangers Timm Murray
- RE: [Freenet-dev] Don't Talk To Strangers Benjamin Coates
- Re: [Freenet-dev] Don't Talk To Strangers Sven Neuhaus