From: hh@cicada.berkeley.edu
To: zeek@io.com (zeek)
Message Hash: 977372418ee00036258409bbc69fbfa0127feb58728f92ee5158430b471dcac1
Message ID: <9311060434.AA19801@cicada.berkeley.edu>
Reply To: <9311051540.AA27805@illuminati.IO.COM>
UTC Datetime: 1993-11-06 04:37:52 UTC
Raw Date: Fri, 5 Nov 93 20:37:52 PST
From: hh@cicada.berkeley.edu
Date: Fri, 5 Nov 93 20:37:52 PST
To: zeek@io.com (zeek)
Subject: Re: Remailer Abuse?
In-Reply-To: <9311051540.AA27805@illuminati.IO.COM>
Message-ID: <9311060434.AA19801@cicada.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
In message <9311051540.AA27805@illuminati.IO.COM>, zeek writes:
>What constitutes remailer abuse is my question. I'm aware of the obvious
>reasons, but unclear about the details.
Harassing other users is considered abuse, and sending chain letters is a
form of harassing other users. However, it's not a very serious form of
abuse. If I found conclusive evidence that someone were sending something
like childporn through my remailer, I would take some pretty drastic
actions. Chainletters are just an annoyance.
>I suppose this question could be asked another way; what constitutes
>the *proper* use of a remailer? Or; have clear guidelines been drawn for
>them?
Well, there aren't any guidelines for the proper use. The only things which
are improper uses are uses designed to make the Net a less friendly place by
harassing other users, and uses which I find morally unbearable, like
childporn or something like that.
Note that the only way I found out that you had sent that through my
remailer was because the mail bounced. The only way I am aware of stuff
going through my remailer is stuff that bounces or when recipients of mail
complain. I don't read logs; I wouldn't have time to do that if I had 30
hour days, and besides, most of it is encrypted anyway.
e
Return to November 1993
Return to “zeek@IO.COM (zeek)”