Michael Poole <[EMAIL PROTECTED]> writes:
> Brian Thomas Sniffen writes:
>
>> But in your model, am I performing the MUA, the MTA, the network
>> stack, libc, the firewall, the NAT software, the routers in between,
>> Spamassassin on your side, the mailing list manager, your MTA, MDA, or
>> MUA?
Brian Thomas Sniffen writes:
> > Yes, the person operating the router is publicly performing the
> > router's code. However, because mechanical transformations are not
> > derivative works under copyright law, and because communications
> > providers are allowed to forward data on request[1], the
Michael Poole <[EMAIL PROTECTED]> writes:
> Brian Thomas Sniffen writes:
>
>> > Yes, the person operating the router is publicly performing the
>> > router's code. However, because mechanical transformations are not
>> > derivative works under copyright law, and because communications
>> > provid
Brian Thomas Sniffen writes:
> It's not peculiar and dangerous; it's relatively common. Many HTTP
> proxies, for example, do this. What I'm trying to point out is that
> transformations happen along the way. Not all of them are strictly
> mechanical. This was meant to demonstrate the poor publ
4 matches
Mail list logo