On Thu, Feb 25, 2010 at 09:24:44AM -0700, Graduate Studies Web Master wrote: > > That's not a very good analogy. The guy listening through the door in your > example *is* actually breaking privacy laws. A better analogy would be: > > Suppose you had a cell phone and some guy asks if he can borrow it and you > say, OK. Then he takes it and uses it, but then someone sitting nearby grabs > it from him and starts making hundreds of phone calls and uses up all your > minutes and texts $4,000 worth of messages. Would you want to be able to put > a stop to that before it happens by monitoring the guy who borrowed your > phone?
A third-party (neither the sender nor the recipient) intercepted personal communication. Please clarify how the analogy is relevant. It sounds like you're taliking about something completely unrelated. -- Andrew McNabb http://www.mcnabbs.org/andrew/ PGP Fingerprint: 8A17 B57C 6879 1863 DE55 8012 AB4D 6098 8826 6868 -------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list
