Bruce Perens: > On 12/04/2013 03:13 AM, Stephane Bortzmeyer wrote: >> Excuse me, but it seems you did not participate in the many >> discussions about privacy in the last ten years. It is now well-known >> that any information can be processed and used to find out about >> users. Monitoring access to these files is one of the simplest means >> to deduce (from the pattern of access) what an user is doing. There >> are therefore many reasons to obscure it. > In my early teens I figured out how to tap telephones and actually tapped a > neighbor and my friend's cop neighbor. The conclusion of my experimentation > was > that other people's phone calls are dreadfully boring.
Imagine if this was admissible in court and that someone else was telling this story about you? How would that have impacted your life? How could it impact your life in the future? > > I don't particularly care if someone can reconstruct a pattern of access from > public file retrievals I make on the web. I can't imagine why anyone would > ever > be interested. > That seems like quite a privilege, doesn't it? Not everyone is so lucky as you - will you stand by their side or dismiss them simply because it doesn't apply to you, in your view? > I have NDAs with various companies and confidentiality orders from a few > courts, > and I'm an insider stockholder for two companies. I'm careful with that data. > But casual stuff on the web? Nothing to hide there. Do you use the same computer for browsing the web as you do for your email? If so, I guess anyone who does would have some negligence to hide, no? Sincerely, Jacob _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
