JB> Date: Sat, 29 Mar 2003 23:22:11 -0600
JB> From: Jack Bates

[ snip ]


JB> One thing to note, a telecommunications service provider is defined in
JB> such a way that anyone running a network is included. This means that
JB> running a business or home network protects your network. If in the
JB> nature of security, you have encrypted tunnels to other offices, those
JB> tunnels are protected from decryption by this Act. It is also important

I agree with your first points, which I snipped, but could a VPN
not be considered concealing origin?  I think that's a _bad_
classification, but am playing devil's advocate, here...

Although I suppose if the company using the VPN is the comms
provider, then they'd not be concealing the origin from
themselves.

I still wonder about promiscuous mode.

IANAL. *shrug*


Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <[EMAIL PROTECTED]>, or you are likely to
be blocked.

Reply via email to