> If the legal attacker isn't going to play by the rules (i.e. no entrapment), 
> then you don't have a chance.  'They' could make a plausible case that running 
> a Freenet node is conspiring to duplicate any content that happens to be on 
> Freenet, even if they can't actually access your node.

Not playing by the rules is precisely why we brought up rejecting unknown
connections. If they played by the rules then I think we've already got
them pretty much under control.



_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to