From: Jeff Barber <jeffb@issl.atl.hp.com>
To: alexlh@yourchoice.nl
Message Hash: 032e99b8005d8e026e6848e41ea5422be0376d7fc1c84e45312c704262b663eb
Message ID: <199710011924.PAA15341@jafar.issl.atl.hp.com>
Reply To: <Mutt.19971001201336.alexlh@sarah.yc>
UTC Datetime: 1997-10-01 18:57:35 UTC
Raw Date: Thu, 2 Oct 1997 02:57:35 +0800
From: Jeff Barber <jeffb@issl.atl.hp.com>
Date: Thu, 2 Oct 1997 02:57:35 +0800
To: alexlh@yourchoice.nl
Subject: Re: "Show me an example of terrorists using the Internet or crypto"
In-Reply-To: <Mutt.19971001201336.alexlh@sarah.yc>
Message-ID: <199710011924.PAA15341@jafar.issl.atl.hp.com>
MIME-Version: 1.0
Content-Type: text/plain
Alex Le Heux writes:
> And anyway,
> "to defend yourself in a war" is not one of the usual arguments against gun
> control.
Actually, most of us prefer the `defend yourself against the government'
argument around here. That's one of the reasons why the right to arms
is enshrined in our constitution.
-- Jeff
Return to October 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”