Page 2 of 2

PostPosted: Tue May 01, 2007 3:26 am
by Thorn
sumatra wrote:I would recommend leaving your wireless traffic unencrypted. This gives you plausible deniability for any P2P "violations".
That is an idiotic move and bad legal advice. If you look at recent court cases, the courts have turned down every mutt who has tried the "plausible deniablity" line. Of course, the fact that the information in question was found on their computers usually shows the "someone else must have done it via my open access point" statement to be a bald-faced lie.

Before posting again, read the Welcome Desk. We have certain rules that we expect members to follow, including re-opening old threads. When you've done that, you might want to check your assumptions about knowing anything about the laws regarding computer crime, or at least read up on current court cases.