Question for article

Scott Collins collins at newton.apple.com
Mon Jan 3 14:54:09 PST 1994


  >Say someone fucks you over (real or imagined) or flames you severely.  What
  >sort of nasty things can you do to them or their data?  You know, like
  >e-mail bombings etc.  I don't need particulars, since this is pointed at a
  >mainstream audience.  (It also might not get published if the technophobic
  >editor(s) think its too risque, if you know what I mean.)

You can:

  - 1 - If the damage done you was real, not just an annoyance, then you might
litigate.

  - 2 - Otherwise, or if there is reason to believe that it was without
intent, then you could be a grown-up: live and learn.

Purile retaliation is the demesne of bullies and children.


  >I have some ideas already, but I'd like to hear from the pros. :->

This sounds like people who study martial arts so they can `really kick
some ass'.  Serious students of many disciplines consider it for defense
only.  This is the case with the technology of privacy.

You have seriously mistaken this list.  This is not a list of `expert
electronic vigalantes' who deal out home brew justice.  This is a group of
people with concerns about technological encroachment on personal privacy,
and ensuring that the information age doesn't swallow law abiding citizens
into a new world of glass houses.

I am sorry to say I can easily imagine what you must have been reading to
give you this impression.


Scott Collins         | "Few people realize what tremendous power there
                      |  is in one of these things."     -- Willy Wonka
......................|................................................
BUSINESS.   voice:408.862.0540  fax:974.6094   collins at newton.apple.com
Apple Computer, Inc.   5 Infinite Loop, MS 305-2B   Cupertino, CA 95014
.......................................................................
PERSONAL.   voice/fax:408.257.1746    1024:669687   catalyst at netcom.com








More information about the cypherpunks-legacy mailing list