From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 83bed09e06831ba9f03aa1ad09641423c5597db6853162b92ef41242f38b32dd
Message ID: <199501190351.TAA09133@largo.remailer.net>
Reply To: <Pine.3.88.9501181026.A29048-0100000@CSOS.ORST.EDU>
UTC Datetime: 1995-01-19 03:52:16 UTC
Raw Date: Wed, 18 Jan 95 19:52:16 PST
From: eric@remailer.net (Eric Hughes)
Date: Wed, 18 Jan 95 19:52:16 PST
To: cypherpunks@toad.com
Subject: Re: (none)
In-Reply-To: <Pine.3.88.9501181026.A29048-0100000@CSOS.ORST.EDU>
Message-ID: <199501190351.TAA09133@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain
From: Brian Beattie <beattie@CSOS.ORST.EDU>
I must assume that the actor who spams me or sends me unsolicited
email or any email for that matter derives some benifit from this
activity or they would not do it.
Much tort involves perceived gain by the tortfeasor, but that doesn't
make it theft.
If I make it clear that I do not wish to receive email from an individual
or group and that individual or group continues to send email then I contend
that they are using my resources in a way that I have not authorized.
So who are you making it clear to, if the parties sending the email
are anonymous?
Eric
Return to January 1995
Return to “Rick Busdiecker <rfb@lehman.com>”