>===== Original Message From Brandon <[EMAIL PROTECTED]> =====
>> If the legal attacker isn't going to play by the rules (i.e. no 
entrapment),
>> then you don't have a chance.  'They' could make a plausible case that 
running
>> a Freenet node is conspiring to duplicate any content that happens to be on
>> Freenet, even if they can't actually access your node.
>
>Not playing by the rules is precisely why we brought up rejecting unknown
>connections. If they played by the rules then I think we've already got
>them pretty much under control.
>

What I meant is:

Evil Bad Guy (no relation to Mr. Bad): A-ha! I found a freenet node!  now I 
will request MSK@illegalporndepot//kiddie.html through it and then use it to 
justify burning down a village/shooting the node operator/getting his ISP to 
pull his account.

Freenet Node: (doesn't say anything because EBG isn't on the allowed hosts 
list)

EBG:  Foiled Again!  Oh, well, I guess I'll give up now.

Not too likely, eh?  Once they a) find your node within their sphere of 
influence  b) acquire enough power to ruin your life c) stop being controlled 
by whatever 'rules' may apply,  the technical details of node behavior become 
irrelevent:  If they want you, they're going to get you.

--
Benjamin Coates


_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to