> An end user operating a TOR exit node, or wide open Wireless AP, > intentionally allows other people to connect to their infrastructure > and the internet whom they have no relationship with or prior > dealings with, in spite of the possibility of network abuse or illegal > activities, they choose to allow connectivity without first > gathering information required to hold the 3rd party responsible for > their activity.
Oh please. I don't know where you've been hiding out for the last half a decade or so, but around here, every McDonalds, Starbucks, Sam's Club, Home Depot, Lowe's, and most libraries, hotels, hospitals, and laundromats offer WiFi, and those are just the ones I can readily think of. The level of wishful-thinking implied by the quoted text about how the Internet works is mind-boggling. ... JG -- Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net "We call it the 'one bite at the apple' rule. Give me one chance [and] then I won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN) With 24 million small businesses in the US alone, that's way too many apples.