-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
well, i think i have good news. although the rep from EFF said that my
internet agreement "could be construed to at least cause [me] problems
with retaining [my] service, if not to win a lawsuit against [me]" i
decided to respond to Qwest's response
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
thanks all for your timely responses. frankly, my PC is the one
accessing the various destinations routed through Tor; it is not like i
have an open switch or wifi network that other pc's can freely connect
to and use my DSL line. further, it does
On Mon, Dec 20, 2010 at 12:54 AM, grarpamp wrote:
>> your residential DSL service
>> is only for the use of your pcs
>> within your home.
>
SCAR: I believe the bottom line here is the " DSL is only for the use
of ' your ' pc . I never had that issue with DSL, but Cable I did and
I had to go to
> your residential DSL service
> is only for the use of your pcs
> within your home.
> You also are responsible for any harmful or illegal traffic that comes
> from your DSL modem.
When others among you are faced with contracts that state
these two things... it may be worthwhile to defer mention
Hrmm. You probably shouldn't be running an exit router on your home
Internet connection, either. To my knowledge, no one has ever had
their door kicked in in the USA for running an exit router, but there
have been phone calls and visits. In other countries, people have had
all of their computing eq
On 12/18/2010 10:20 AM, scar wrote:
> Mike Perry @ 12/17/2010 07:24 PM:
> > See:
> >
> https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
>
>
> thanks. i checked that out. i took the first step of directly
> contacting my ISP (Qwest) and mentioned my reasons for running th
On Sat, Dec 18, 2010 at 11:20:46AM -0700, scar wrote:
> misconceptions, the part referring to section 7 of the service agreement
> seems relevant. suggestions?
>
>
> Dmca violations are treated seriously by Qwest and if they continue you
> will lose your DSL service.
> You mentioned you were ope
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Mike Perry @ 12/17/2010 07:24 PM:
> See:
> https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
>
thanks. i checked that out. i took the first step of directly
contacting my ISP (Qwest) and mentioned my reasons for running t
Mostly off-topic, except in regard to a possible defense for
Tor relays/users in the event any go that far.
I'm amazed they are able to lodge cases based on
what appear to be BT scrapes of BT announcements.
Certainly your announcement could be just that, metadata
only. And your file could be /dev
9 matches
Mail list logo