I think they're saying that byu is lending you its phone and should be able to monitor it. use gpg, ssh tunnels. probalo solved.
Stephen Mardson McQuay mardson.com On Thu, Feb 25, 2010 at 11:14 AM, Andrew McNabb <[email protected]> wrote: > On Thu, Feb 25, 2010 at 09:24:44AM -0700, Graduate Studies Web Master wrote: >> >> That's not a very good analogy. The guy listening through the door in your >> example *is* actually breaking privacy laws. A better analogy would be: >> >> Suppose you had a cell phone and some guy asks if he can borrow it and you >> say, OK. Then he takes it and uses it, but then someone sitting nearby grabs >> it from him and starts making hundreds of phone calls and uses up all your >> minutes and texts $4,000 worth of messages. Would you want to be able to put >> a stop to that before it happens by monitoring the guy who borrowed your >> phone? > > A third-party (neither the sender nor the recipient) intercepted > personal communication. Please clarify how the analogy is relevant. It > sounds like you're taliking about something completely unrelated. > > -- > Andrew McNabb > http://www.mcnabbs.org/andrew/ > PGP Fingerprint: 8A17 B57C 6879 1863 DE55 8012 AB4D 6098 8826 6868 > -------------------- > BYU Unix Users Group > http://uug.byu.edu/ > > The opinions expressed in this message are the responsibility of their > author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. > ___________________________________________________________________ > List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list > -------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list
