On Thu, Feb 25, 2010 at 09:24:44AM -0700, Graduate Studies Web Master wrote:
> 
> That's not a very good analogy. The guy listening through the door in your 
> example *is* actually breaking privacy laws. A better analogy would be:
> 
> Suppose you had a cell phone and some guy asks if he can borrow it and you 
> say, OK. Then he takes it and uses it, but then someone sitting nearby grabs 
> it from him and starts making hundreds of phone calls and uses up all your 
> minutes and texts $4,000 worth of messages. Would you want to be able to put 
> a stop to that before it happens by monitoring the guy who borrowed your 
> phone?

A third-party (neither the sender nor the recipient) intercepted
personal communication.  Please clarify how the analogy is relevant.  It
sounds like you're taliking about something completely unrelated.

-- 
Andrew McNabb
http://www.mcnabbs.org/andrew/
PGP Fingerprint: 8A17 B57C 6879 1863 DE55  8012 AB4D 6098 8826 6868
--------------------
BYU Unix Users Group 
http://uug.byu.edu/ 

The opinions expressed in this message are the responsibility of their
author.  They are not endorsed by BYU, the BYU CS Department or BYU-UUG. 
___________________________________________________________________
List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list

Reply via email to