lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5aad114b05082919337a63fea5@mail.gmail.com>
Date: Tue Aug 30 03:33:13 2005
From: womber at gmail.com (womber)
Subject: Re: The Wireless Networking Excuse

On 8/29/05, yahoo123456@...hmail.com <yahoo123456@...hmail.com> wrote:
> Has anyone examined the idea of using a public hotspot on a local 
> network to shield BSA, RIAA, MPAA lawsuits? Since the tracking 
> stops at the public facing IP, who is to say it wasn't some 
> freeloader downloading the warez? 
> 
> Just looking for some feedback on this one...


It is an interesting point. I have thought about it myself in the
context of having my personal access point open to the public and if
someone hopped on and downloaded something.
Would I be resposible if they tracked it back to my AP?
I am not a legal expert by any means but I would think it would be
comparable to someone using my phone to make a harasing call.
Although I am not sure how that would be ruled either.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ