pseudoanonymous correction
rjc@gnu.ai.mit.edu writes:
Very serious abuses of (5) can lead to insideous deception and treachery, particularly in the interplay between public and private [opps, a paragraph got cut out somehow, oh well] The same case can be made for free speech. Allowing hate speech mongers the protection of free speech could lead to negative public
--Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it. -- Ray Cromwell | Engineering is the implementation of science; -- -- EE/Math Student | politics is the implementation of faith. -- -- rjc@gnu.ai.mit.edu | - Zetetic Commentaries --
participants (1)
-
rjc@pseudospoofer.exploit.org