1996-04-18 - Re: EFF/Bernstein Press Release

Header Data

From: s1113645@tesla.cc.uottawa.ca
To: Tree frog mailing list <cypherpunks@toad.com>
Message Hash: c564c3e17b475471af068a19017d98cdfd260c8277a335768613ff01e098e6bc
Message ID: <Pine.3.89.9604180825.A31115-0100000@tesla.cc.uottawa.ca>
Reply To: <199604180731.RAA09977@oznet02.ozemail.com.au>
UTC Datetime: 1996-04-18 17:04:56 UTC
Raw Date: Fri, 19 Apr 1996 01:04:56 +0800

Raw message

From: s1113645@tesla.cc.uottawa.ca
Date: Fri, 19 Apr 1996 01:04:56 +0800
To: Tree frog mailing list <cypherpunks@toad.com>
Subject: Re: EFF/Bernstein Press Release
In-Reply-To: <199604180731.RAA09977@oznet02.ozemail.com.au>
Message-ID: <Pine.3.89.9604180825.A31115-0100000@tesla.cc.uottawa.ca>
MIME-Version: 1.0
Content-Type: text/plain




On Thu, 18 Apr 1996, Mark Neely wrote:

> Well, that puts legislation making virus authoring a crime
> into a new (and difficult) position.

For that matter, is issuing unix and tcp/ip commands an act of speech
even when cracking into someone else's computer?

(I realize this might be made moot by having to read the output and 
violating the target's privacy, but then the act of cracking, in itself,
might only require commands standard on all machine, that also have 
standard and therefore predictable responses, entailing no privacy loss.)





Thread