From: Adam Back <aba@dcs.ex.ac.uk>
To: kent@songbird.com
Message Hash: c80f783508aafdc50ca4607ece3b61878d47f42d7bf35b5ca4b76b428b71cc6e
Message ID: <199708061705.SAA03362@server.test.net>
Reply To: <19970806075802.12530@bywater.songbird.com>
UTC Datetime: 1997-08-06 18:33:34 UTC
Raw Date: Thu, 7 Aug 1997 02:33:34 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Thu, 7 Aug 1997 02:33:34 +0800
To: kent@songbird.com
Subject: anti-spam law implies laws against remailers? (was Re: bulk postage fine)
In-Reply-To: <19970806075802.12530@bywater.songbird.com>
Message-ID: <199708061705.SAA03362@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain
Kent Crispin <kent@songbird.com> writes:
> On Sun, Aug 03, 1997 at 12:29:37PM +0100, Adam Back wrote:
> > Here's the sequence of events as I see it:
> >
> > 1. spammer spams you with adverisement for phone sex line
> > 2. you try to sue phone sex line company
> > 3. phone sex company denies all knowledge
> > 4. government says all email must be authenticated
> > 5. government issues internet drivers license
> > 6. anonymous remailers work around authentication requirement
> > 7. government outlaws remailers
> >
> > See any flaws in that logical and undesirable sequence of events?
>
> The flaws become apparent if you try to attach a *realistic*
> probability to each step.
Difficult to do.
However, consider:
1) Government anti-spam laws won't work (too many loop holes, #1 of
which is there are other countries in the world other than US, #2 is
remailers will be used which will leave remailer operator rather than
spammer to face the music).
2) When the government or whoever wants to sue someone for spam they
will have to prove who the spammer is. (Right?) So now they'll
look at the From address at it will say remailer@foo.com. So
they'll go have a chat to Fred Q Cypherpunk who operates foo, and he
won't be able to cooperate because he doesn't keep logs. They won't
be happy with Fred, and will pass this information along to him by
stealing his equipment, prosecuting him for assisting in a felony
crime (they'll make it a felony right?), lock him and throw away
the key. But what about Freds constitutional protection of the
speech forwarded by his remailer? (Judge + congress-critter:
Constitution wassat?)
3) Repeat step 2 x 100 and "something will have to be done" about the
remailers (if there are any left!) It really isn't that far
fetched to have laws against remailers in the US. Not so long ago
the guy from the two-man band Georgia EFF were telling us about how
they fought some law which had already tried to do this in that
state.
4) New laws nearly always reduce your freedoms - in phrasing the law,
and compromising their way around whatever "issues" they try to
construct, they'll try to hide something else in there which we don't
want. (eg no encrypted email, or no import of crypto, or something
stupidly unrelated -- happens all the time).
5) It's the net man, what do you want government officials crawling all
over it, and lawyers arguing about it's content for? It sets a bad
precedent.
ps Kent, did you convert your rsa.midi to a .au file? I haven't got
my /dev/midi configured properly under linux, but can play .au files,
and am dying to hear it :-)
Adam
--
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to August 1997
Return to “Tim May <tcmay@got.net>”