Of course, nothing can stop Amazon from entering your credit card data
and/or address into another program. They need to see this data in
order to perform their normal business functions, and anyone can read
it off the screen and type it into another computer. But the point
is, they can't
Bob - I'm not sure if you copied David separately/Bcc on your reply,
and I've dropped Cc:s to some of your lists that I'm not on,
and I missed your original message that David flamed you for
which you're flaming back about, but
Perhaps I've missed some really critical things the time or two
On Mon, 24 Jun 2002, Anonymous wrote:
The important thing to note is this: you are no worse off than today!
You are already in the second state today: you run untrusted, and none
of the content companies will let you download their data. But boolegs
are widely available.
The problem is that
hi,
If there is no previous shared secret,then ur
communication on an insecure network is susecptable to
the man in the middle attack.
One solution suggested against the man in the middle
attack is using the interlock protocol
InterLock Protocol
Is used to foil a man in the middle
Yes, this is a debate I've had with the medical privacy7 guys, some of
whom like the idea of using Palladium to protect medical records.
This is a subject on which I've a lot of experience (see my web page),
and I don't think that Palladium will help. Privacy abuses almost always
involve abuse
At 11:13 AM -0400 on 6/29/02, R. A. Hettinga wrote:
Ceasar
Romero,
Oops. Conflation between Ceasar Romero, Aldo Rey, and the character Aldo
in the *third* and *fourth* Planet of the Apes sequellae, played, in the
fourth movie's speaking role, by Claude Akins.
IMDB is your friend. ;-).
Anonymous writes
This shouldn't have to be said, but apparently it is necessary.
And even if it isn't, you're going to say it anyway, aren't you?
Piracy - unauthorized copying of copyrighted material - is wrong.
It inherently involves lying, cheating and taking unfair advantage
of others.
This shouldn't have to be said, but apparently it is necessary.
Piracy - unauthorized copying of copyrighted material - is wrong.
It inherently involves lying, cheating and taking unfair advantage
of others. Systems like DRM are therefore beneficial when they help to
reduce piracy. We should
On Fri, Jun 28, 2002 at 05:29:17PM +0200, Eugen Leitl wrote:
I've bought me a little (32 MBytes) hotpluggable USB flash stick (a
TrekStor). It mounts fine, but what I'd like to do is to automount it, and
fire up a program (I intend to put my keyring on it) if hotplugged.
You need to enable
[From: Anonymous]
If you take the song without paying for it, you are again receiving this
gift without following the conditions that were placed on it as part
of the gift being offered. You are taking advantage of the artist's
creativity without them receiving the compensation they
At 03:31 AM 06/29/2002 -0700, [EMAIL PROTECTED] wrote:
Thanks Bill, for passing on your message, along with the news that I've been
dissed and discussed by R.A. Hettinga. Naturally, he never informed me, nor
copied me his missives, nor invited me to answer. This appears to be quite
typical.
...hypoxic, spittle-soaked screed elided...
(I remember something my brother said to me once, in another context
hereabouts, about being careful not to get into a pissing match with a
sewer outfall. Oh, well. Hope it was as good for him as it was for me, and
all that...)
Plutocracy forever,
At 1:49 PM -0400 on 6/29/02, Somebody wrote:
I am delighted to see that David Brin is becoming even more loony with the
passing of time, and even more delighted to find you quoting him. What
else can one do with Brin, but quote him? More than anyone I have ever
known, he debunks himself,
Anonymous wrote:
Piracy - unauthorized copying of copyrighted material - is wrong.
http://www.gnu.org/philosophy/words-to-avoid.html
When an artist releases a song or some other creative product to the
world, they typically put some conditions on it.
Don't overlook the fact that when the
[summary: TCPA is a tool which even if not necessarily always used
for DRM applications, and other far more evil applications, is
dangerous enough that it must be killed to prevent the introduction
of, and legal mandate for, these DRM and other more evil
applications. People should be prepared
-- Original Message --
From: Anonymous [EMAIL PROTECTED]
Date: Sat, 29 Jun 2002 20:16:06 +0200 (CEST)
When an artist releases a song or some other creative product to the
world, they typically put some conditions on it. If you want to listen
to and
Subject: CDR: Piracy is wrong
This shouldn't have to be said, but apparently it is necessary.
Which is a correct statement, but an incorrect line of thinking. Piracy is
an illegitimate use of a designed in hole in the security, the ability to
copy. This right to copy for personal use is well
R. A. Hettinga writes:
At 3:31 AM -0700 on 6/29/02, [EMAIL PROTECTED] paints a picture out
of the second Planet of the Apes movie, Roddy McDowell, Ceasar
Romero, and all...:
Brin said:
An AGGRESSIVE approach, barging into the citadels of power,
ripping the blinds, opening the windows,
On Wed, 26 Jun 2002, Barney Wolff wrote:
Do you really mean that if I'm a business, you can force me to deal with
you even though you refuse to supply your real name? Not acceptable.
I don't think that privacy (in the sense of having the right
to keep private details of your life from being
19 matches
Mail list logo