On 18/09/2013 01:50, John Gilmore wrote:
Re Big Data: I have never seen data that could be abused by someone
who didn't have a copy of it. My first line of defense of privacy is
to deny copies of that data to those who would collect it and later
use it against me. This is exactly the policy
On 08/09/2013 21:51, Perry E. Metzger wrote:
On Sun, 8 Sep 2013 14:50:07 -0400 Jerry Leichter leich...@lrw.com
wrote:
Even for one-to-one discussions, these days, people want
transparent movement across their hardware. If I'm in a chat
session on my laptop and leave the house, I'd like to be