|| On Thu, 17 May 2007 15:21:29 -0700 || Mawaki Chango <[log in to unmask]> wrote: mc> So apart from being careful to one's system security, Considering that you are running a piece of software of which you have no idea what it is doing, that is by definition connected to the network and that has full access to all your data and system, how exactly are you careful about your security? mc> I don't really see a big deal out of tolerating some peering mc> contribution in bandwith [...] I recommend you take a look at some of the legislation around DRM and copyright, in particular. Robin will know more about this than me, but to my knowledge the EFF had quite some fun with legal attacks against anonymisers where the individual nodes also had no idea of what they were transporting. Regards, Georg -- Georg C. F. Greve <[log in to unmask]> Free Software Foundation Europe (http://fsfeurope.org) Join the Fellowship and protect your freedom! (http://www.fsfe.org) What everyone should know about DRM (http://DRM.info)