Is ths legal?.. (fwd)

Jay Holovacs holovacs at styx.ios.com
Sun Dec 17 08:02:45 PST 1995



On Sun, 17 Dec 1995, Black Unicorn wrote:
> 
> I disagree.  Instead it implies that interception and administrative 
> review of content will be tolerated where it is "a necessary incident to 
> the rendition of his service or to the protection of the rights or 
> property of the provider of that service."  Note that it will be the 
> provider who makes the definition in the ex ante application.
> 
The provider is allowed access ONLY for QC purposes. Getting back to thhe 
original point, the provider's ability to interpret the contents of the 
message is in no way required to monitor the system and cannot be used as 
a justification in itself for prohibiting use of crypto. 

Also, what if someone outside the system emails encrypted messages to the 
user. What authority would the sys admin have there??

Jay Holovacs <holovacs at ios.com>
PGP Key fingerprint =  AC 29 C8 7A E4 2D 07 27  AE CA 99 4A F6 59 87 90 
 (KEY id 1024/80E4AA05) email for key







More information about the cypherpunks-legacy mailing list