1995-01-19 - Re: (none)

Header Data

From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 83bed09e06831ba9f03aa1ad09641423c5597db6853162b92ef41242f38b32dd
Message ID: <199501190351.TAA09133@largo.remailer.net>
Reply To: <Pine.3.88.9501181026.A29048-0100000@CSOS.ORST.EDU>
UTC Datetime: 1995-01-19 03:52:16 UTC
Raw Date: Wed, 18 Jan 95 19:52:16 PST

Raw message

From: eric@remailer.net (Eric Hughes)
Date: Wed, 18 Jan 95 19:52:16 PST
To: cypherpunks@toad.com
Subject: Re: (none)
In-Reply-To: <Pine.3.88.9501181026.A29048-0100000@CSOS.ORST.EDU>
Message-ID: <199501190351.TAA09133@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain


   From: Brian Beattie <beattie@CSOS.ORST.EDU>

   I must assume that the actor who spams me or sends me unsolicited
   email or any email for that matter derives some benifit from this 
   activity or they would not do it.

Much tort involves perceived gain by the tortfeasor, but that doesn't
make it theft.

   If I make it clear that I do not wish to receive email from an individual
   or group and that individual or group continues to send email then I contend
   that they are using my resources in a way that I have not authorized.

So who are you making it clear to, if the parties sending the email
are anonymous?

Eric





Thread