[45517] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Is ths legal?.. (fwd)

daemon@ATHENA.MIT.EDU (Jay Holovacs)
Sun Dec 17 10:48:34 1995

Date: Sun, 17 Dec 1995 10:25:59 -0500 (EST)
From: Jay Holovacs <holovacs@styx.ios.com>
To: cypherpunks <cypherpunks@toad.com>
In-Reply-To: <Pine.SUN.3.91.951217101355.22454C-100000@polaris.mindport.net>


On Sun, 17 Dec 1995, Black Unicorn wrote:
> 
> I disagree.  Instead it implies that interception and administrative 
> review of content will be tolerated where it is "a necessary incident to 
> the rendition of his service or to the protection of the rights or 
> property of the provider of that service."  Note that it will be the 
> provider who makes the definition in the ex ante application.
> 
The provider is allowed access ONLY for QC purposes. Getting back to thhe 
original point, the provider's ability to interpret the contents of the 
message is in no way required to monitor the system and cannot be used as 
a justification in itself for prohibiting use of crypto. 

Also, what if someone outside the system emails encrypted messages to the 
user. What authority would the sys admin have there??

Jay Holovacs <holovacs@ios.com>
PGP Key fingerprint =  AC 29 C8 7A E4 2D 07 27  AE CA 99 4A F6 59 87 90 
 (KEY id 1024/80E4AA05) email for key


home help back first fref pref prev next nref lref last post