From: s1113645@tesla.cc.uottawa.ca
To: Tree frog mailing list <cypherpunks@toad.com>
Message Hash: c564c3e17b475471af068a19017d98cdfd260c8277a335768613ff01e098e6bc
Message ID: <Pine.3.89.9604180825.A31115-0100000@tesla.cc.uottawa.ca>
Reply To: <199604180731.RAA09977@oznet02.ozemail.com.au>
UTC Datetime: 1996-04-18 17:04:56 UTC
Raw Date: Fri, 19 Apr 1996 01:04:56 +0800
From: s1113645@tesla.cc.uottawa.ca
Date: Fri, 19 Apr 1996 01:04:56 +0800
To: Tree frog mailing list <cypherpunks@toad.com>
Subject: Re: EFF/Bernstein Press Release
In-Reply-To: <199604180731.RAA09977@oznet02.ozemail.com.au>
Message-ID: <Pine.3.89.9604180825.A31115-0100000@tesla.cc.uottawa.ca>
MIME-Version: 1.0
Content-Type: text/plain
On Thu, 18 Apr 1996, Mark Neely wrote:
> Well, that puts legislation making virus authoring a crime
> into a new (and difficult) position.
For that matter, is issuing unix and tcp/ip commands an act of speech
even when cracking into someone else's computer?
(I realize this might be made moot by having to read the output and
violating the target's privacy, but then the act of cracking, in itself,
might only require commands standard on all machine, that also have
standard and therefore predictable responses, entailing no privacy loss.)
Return to April 1996
Return to “s1113645@tesla.cc.uottawa.ca”