From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,dbd35bb508093bd9 X-Google-Attributes: gid103376,public X-Google-ArrivalTime: 2002-12-06 08:35:26 PST Path: archiver1.google.com!news2.google.com!news1.google.com!newsfeed.stanford.edu!bloom-beacon.mit.edu!nycmny1-snh1.gtei.net!news.gtei.net!news-out.visi.com!hermes.visi.com!uunet!ash.uu.net!spool0900.news.uu.net!reader0901.news.uu.net!not-for-mail Date: Fri, 06 Dec 2002 11:19:39 -0500 From: Hyman Rosen User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.3a) Gecko/20021203 X-Accept-Language: en-us, en MIME-Version: 1.0 Newsgroups: comp.lang.ada Subject: Re: New Ada compiler for .NET References: <3DEA5CC0.6B435E66@adaworks.com> <1039118476.628446@master.nyc.kbcfp.com> <1039187333.113972@master.nyc.kbcfp.com> In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Organization: KBC Financial Products Message-ID: <1039191579.943813@master.nyc.kbcfp.com> Cache-Post-Path: master.nyc.kbcfp.com!unknown@nightcrawler.nyc.kbcfp.com X-Cache: nntpcache 3.0.1 (see http://www.nntpcache.org/) NNTP-Posting-Host: 204.253.250.10 X-Trace: 1039191581 reader1.ash.ops.us.uu.net 18384 204.253.250.10 Xref: archiver1.google.com comp.lang.ada:31500 Date: 2002-12-06T11:19:39-05:00 List-Id: Preben Randhol wrote: > What about when you talk on your phone in your home? I'm not sure what the status of the law on this is. But generally, listening to these phone calls requires physical access to wires, and so requires the consent of the owners of those wires. Prudent people with secrets to hide don't speak of them openly in telephone calls. They certainly don't use cell phones, which broadcast their signals for all to hear. > Or peek into your bedroom in evenings/night? That's why curtains exist. > Where do you draw the line of privacy? If I wish something to be private, it's my job to not do it publicly. > Another point is that how do you know that such a system isn't abused. There is no such thing as abuse of public information. It's like the GPL. If I want to use free software to help in the making bombs, that's perfectly fine. > Industrial espionage for example. As long as the information is publicly available, that's perfectly fine.