From: “Robert A. Rosenberg” <hal9001@panix.com>
To: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
Message Hash: f39feaf70352ed8453fd43247bd61cbd231583b26ea70d3db5749132efa85d4b
Message ID: <v02140b04ad97a0080cf4@[166.84.254.3]>
Reply To: N/A
UTC Datetime: 1996-04-15 10:59:24 UTC
Raw Date: Mon, 15 Apr 1996 18:59:24 +0800
From: "Robert A. Rosenberg" <hal9001@panix.com>
Date: Mon, 15 Apr 1996 18:59:24 +0800
To: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Subject: Re: [Political Rant] Was: examples of mandatory content rating?
Message-ID: <v02140b04ad97a0080cf4@[166.84.254.3]>
MIME-Version: 1.0
Content-Type: text/plain
At 18:52 4/14/96, E. ALLEN SMITH wrote:
>I'm not sure if the major use for ratings may not be searching for
>material that the raters don't like. I'd be interested in many things the
>fundys don't like, for instance. One could even do this via one of the
>"services" that mails out listings of places to be locked from kids - just
>sign up one of your anonymous employees, and get the data and put it on your
>anonymous web access site. Doing so - if you don't admit you've done it - may
>be cheaper than doing the research yourself. Of course, you'll need to check
>out each such site to make sure that it isn't a decoy that they've inserted.
When you do the checking, make sure it is from an IPN that does not point
back at you (or at least only points to a Server Supplied not a Dedicated
IPN). You might also want to watch out for "Canary Trap" Decoys (where each
list has an unique set of Decoys [or at least one unique Decoy] so they can
tell which copy was compromised). I'm assuming that the Decoy is a "valid"
[possibly virtual] domain address which is being logged.
Return to April 1996
Return to ““Robert A. Rosenberg” <hal9001@panix.com>”
1996-04-15 (Mon, 15 Apr 1996 18:59:24 +0800) - Re: [Political Rant] Was: examples of mandatory content rating? - “Robert A. Rosenberg” <hal9001@panix.com>