ietf
[Top] [All Lists]

Re: spam (fwd) (edit error on previous)

2003-05-26 22:48:01


Valdis(_dot_)Kletnieks(_at_)vt(_dot_)edu wrote:

On Mon, 26 May 2003 18:53:12 PDT, Peter Deutsch said:

The case we prosecuted turned out to be a small group of kids breaking
into compute hosts, but from what I was told I would think you should be
able to use the same provision against spam relayers, since the key
element was the unauthorized use of compute cycles, not what they did
with the cycles.

IANAL by any means, but I suspect that the owner of an open relay would have
a hard time demonstrating unauthorized use of cycles to relay mail *through
an open relay*.  Now if the spammer actively *bypassed* a security feature
in order to relay the mail, that would be different, as it would indicate
that they knew it was unauthorized...

Exaxtly, so you don't leave it open. Then, the only folks who would be
using you as a relay would be a) folks you've authorized to do so. By
definition the folks who are doing so without your authorization, would
be breaking the law and we have an existance proof that this stuff is
quite traceable and quite prosecutable. 

As a bonus, the law they would be breaking isn't one that must, in the
U.S. context, stand up to arguments about it supressing free speech and
so on. And I have no trouble with this, since you have a right to say
what you want, but I have a right not to listen, nor am I responsible
for providing you with a soapbox and megaphone...


                                - peterd




-- 
---------------------------------------------------------------------
    Peter Deutsch                       pdeutsch(_at_)gydig(_dot_)com
    Gydig Software


                        "Bungle..."
               "That's an 'i', you idiot..."
                  "Oh, right. 'Bingle..."

                            - Red versus Blue...

---------------------------------------------------------------------