1995-01-17 - Re: (none)

Header Data

From: Brian Beattie <beattie@CSOS.ORST.EDU>
To: Mats Bergstrom <asgaard@sos.sll.se>
Message Hash: 938df29cc67b3324d0351667ae7de3ad86e1f27e43ace642974eb58b394c8f49
Message ID: <Pine.3.88.9501171208.A21790-0100000@CSOS.ORST.EDU>
Reply To: <Pine.HPP.3.91.950117193541.25204A-100000@cor.sos.sll.se>
UTC Datetime: 1995-01-17 20:28:42 UTC
Raw Date: Tue, 17 Jan 95 12:28:42 PST

Raw message

From: Brian Beattie <beattie@CSOS.ORST.EDU>
Date: Tue, 17 Jan 95 12:28:42 PST
To: Mats Bergstrom <asgaard@sos.sll.se>
Subject: Re: (none)
In-Reply-To: <Pine.HPP.3.91.950117193541.25204A-100000@cor.sos.sll.se>
Message-ID: <Pine.3.88.9501171208.A21790-0100000@CSOS.ORST.EDU>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 17 Jan 1995, Mats Bergstrom wrote:

> On Tue, 17 Jan 1995, Name withheld on request wrote:
> 
> > wonders to what end remailers are being put by people who are worried
> > about being "sold out".
> 
> The fundamental principle here is that an e-mail message is just so
> many bits of 1's and 0's. It can never, in it's own capacity, steal,
I disagree, one can use e-mail to steal.  E-mail consumes resources,
resources for which the sender may have no right to use.  If the sender
is sending messages which the recipient does not wish to receive then
his resources are being taken.  If the recipient has now way of stopping
the messages then the recipients resources are being taken against the
recipient's will and the recipient should be able to have the messages
stopped before they consume the recipients resources.

Brian Beattie         | [From an MIT job ad] "Applicants must also have
                      | extensive knowledge of UNIX, although they should
beattie@csos.orst.edu | have sufficently good programming taste to not
Fax (503)754-3406     | consider this an achievement."






Thread