[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040511214527.47499.qmail@web60603.mail.yahoo.com>
From: geggam692000 at yahoo.com (D B)
Subject: Wireless ISPs
Hi Frank
Tis a multiple faceted thing
The one point it can be addresssed for everyone is at
the wireless AP, thus I would conclude it is their
responsibility.
Im reasonably sure a jury would follow suit,
especially when they find out raising the bar to limit
this would take entering a "password" at the access
point and the wireless customer.
This isnt nature and leaving it alone doesnt fall
under an act of god exclusion, there are easily used
methods of limiting this and if they arent used I
could see a serious lawsuit. ( IANAL disclaimer )
They wouldnt even have to use WEP or WAP, merely using
a secure mail server would raise the level one step
above plaintext spewing of data. SSL for websites that
need it and email would limit sniffing to finding out
who is a pervert in the area. (that could be a good
thing)
Dan Becker
--- Frank Knobbe <frank@...bbe.us> wrote:
> On Tue, 2004-05-11 at 14:20, D B wrote:
> > [...] Guess what ? the Credit card #
> > and address are in that email.
>
> The ones I get have several **** in them. It's again
> a blanket statement
> you make.
>
> Besides, I think you're confusing web sites
> operators/developers with
> {wired|wireless} ISPs.
>
> Cheers,
> Frank
>
>
> ATTACHMENT part 2 application/pgp-signature
name=signature.asc
__________________________________
Do you Yahoo!?
Win a $20,000 Career Makeover at Yahoo! HotJobs
http://hotjobs.sweepstakes.yahoo.com/careermakeover
Powered by blists - more mailing lists