Previous Issue (Only one)
Classified Ads
TD Extra News
Add this Digest to your personal or  
Message Digest Volume 28 : Issue 4 : "text" Format Messages in this Issue: The Medium: We Interrupt This Program Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Re: Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Re: Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Re: Reduced spam and increased security infrastructure? Re: Reduced spam and increased security infrastructure? Re: Reduced spam and increased security infrastructure? Re: Any user reviews of the Magic Jack? ====== 27 years of TELECOM Digest -- Founded August 21, 1981 ====== Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest. ---------------------------------------------------------------------- Date: Sat, 3 Jan 2009 22:44:43 -0500 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: The Medium: We Interrupt This Program Message-ID: <p06240831c585e0e16261@[10.0.1.6]> The Medium We Interrupt This Program By VIRGINIA HEFFERNAN The New York Times January 4, 2009 My video will resume after this ad, in 26 seconds. The video is really a movie - or at least it was a movie. I don't know what to call it while I'm watching it on my computer screen, with my browser set to Hulu, the streaming-video site. Let's call it "Wimbledon." Released in 2004, it's a romantic comedy about tennis that I could have seen for $8 or so in a theater four years ago or ordered from Netflix, caught on HBO or bought as a DVD for $4 on eBay. But I didn't. In fact, I only now discovered it in the modest movie lineup on Hulu. After a rocky start during which it was hazed as just another slick effort to upstage the fun, do-it-yourself YouTube, Hulu became great. The Associated Press just named Hulu its Web Site of the Year for 2008. However, there are ads. All videos (TV shows, movies, clips, news) are prefaced on Hulu by unavoidable commercials; you can't click to shut them off or fast-forward through them. With longer videos, ads appear at regular intervals - but it's just one ad, usually a tightly produced 15- to 30-second spot, rather than a TV-style cluster. Some movies have sponsors who offer "limited commercial interruption" - about four ads per film. Cutting into "Wimbledon," this sweet, brisk British mood-lifter in which Paul Bettany falls in love with Kirsten Dunst, is an Ad Council public service announcement for healthful eating. Annoying. At the top of the movie, I swear Halls cough drops announced that it was presenting this movie without ads. Or was it without many ads? ... http://www.nytimes.com/2009/01/04/magazine/04wwln-medium-t.html ------------------------------ Date: Sun, 4 Jan 2009 00:51:25 -0500 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Message-ID: <p06240842c585fe7b5292@[10.0.1.6]> Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Jason Mick January 1, 2009 Privacy advocates concerned about a strict new law in Georgia which removes sex offender's online privacy The latest scuffle over online privacy is brewing up in Georgia. An aggressive new law is set to take effect today which will force sex offenders to hand over their internet passwords, screen names, and e-mail addresses to the government for monitoring purposes. Several other states also have efforts that track sex offender's email and screen names. However, Georgia, which has 16,000 registered offenders, will be the first state to demand the sex offenders' passwords as well. A similar law in Utah was already struck down by a federal judge, who ruled that it violated the privacy rights of an offender who challenged it. However, that ruling was rather narrow as it applied to an offender tried on a military conviction who had never been in Utah's court or prison system. ... http://www.dailytech.com/article.aspx?newsid=13832 ***** Moderator's Note ***** Hold on to your hats: this is the start of a wild ride up and down the roller coaster of public-opinion. It is a classic case of a Camel's nose under the edge of the shelter that covers our all-important civil right to keep our papers and effects free from unreasonable search and seizure. Sex offenders? No problem: most voters will say "f*&^ 'em, who cares?". Convicted fellons of all stripes? Rerun previous tape. Persons charged with crimes but not yet convicted? Hmmm. Once the apparatus needed to monitor someone who <insert your least palatable, most loathsome, and repulsive action here>, IT WILL BE USED FOR OTHER PURPOSES. Be careful what you wish for: security and freedom both have a price. Bill Horne Temporary Moderator ------------------------------ Date: Sun, 04 Jan 2009 08:40:52 -0800 From: AES <siegman@stanford.edu> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Message-ID: <siegman-5822A0.08402204012009@news.stanford.edu> In article <p06240842c585fe7b5292@[10.0.1.6]>, Monty Solomon <monty@roscom.com> wrote: > ***** Moderator's Note ***** > > Hold on to your hats: this is the start of a wild ride up and down the > roller coaster of public-opinion. It is a classic case of a Camel's > nose under the edge of the shelter that covers our all-important civil > right to keep our papers and effects free from unreasonable search and > seizure. > > Sex offenders? No problem: most voters will say "f*&^ 'em, who cares?". > Convicted fellons of all stripes? Rerun previous tape. > Persons charged with crimes but not yet convicted? Hmmm. > > Once the apparatus needed to monitor someone who <insert your least > palatable, most loathsome, and repulsive action here>, IT WILL BE USED > FOR OTHER PURPOSES. Be careful what you wish for: security and freedom > both have a price. Thank you for this; it's _very_ well put. ------------------------------ Date: Sun, 04 Jan 2009 17:04:47 -0600 From: gordon@hammy.burditt.org (Gordon Burditt) To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Sex Offenders in Georgia Stripped of Privacy, Must Hand Over Passwords Message-ID: <r-ydnYFIYaES3fzUnZ2dnUVZ_gkAAAAA@posted.internetamerica> >Privacy advocates concerned about a strict new law in Georgia which >removes sex offender's online privacy > >The latest scuffle over online privacy is brewing up in Georgia. An >aggressive new law is set to take effect today which will force sex >offenders to hand over their internet passwords, screen names, and >e-mail addresses to the government for monitoring purposes. Several Online providers need to strictly enforce their terms of service on this matter: you're not allowed to give out your password to someone else, and if you do, [they are supposed to] turn off the account. ------------------------------ Date: Sun, 4 Jan 2009 01:22:01 -0500 (EST) From: Dan Lanciani <ddl@danlan.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Reduced spam and increased security infrastructure? Message-ID: <200901040622.BAA10584@ss10.danlan.com> dave.garland@wizinfo.com (Dave Garland) wrote: |Dan Lanciani wrote: |> dave.garland@wizinfo.com (Dave Garland) wrote: |> |Credit bureaus sell |> |information about you... Make them liable for damages if you are harmed in |> |any way by their sale of untrue information. |> |> While I certainly have no objection to such a rule, it does nothing |> to help the "identify theft" problem where the credit bureau provides |> true information about the victim... | |The "theft" problem is more properly a problem of negligence in |properly identifying someone when issuing them credit. Yes, of course. And given the current structure the simplest solution is credit inquiry locks. |So the perp claims he's you, runs up big bills, and doesn't pay them. | |That's really not much of a problem for you, until the credit bureau |starts telling people it was you who ran up the bills, thus affecting |your credit. It's a problem for you when the people who think you borrowed money from them try to recover. They often have lawyers who know how to use the court system to get judgements. |If they were liable for the truthfulness of the |information, you'd have recourse. You would not have recourse for the harm caused by the debt which is now in your name. |(They could, of course, contract |with businesses who report to them, that those business would |reimburse them for any claims due to the falsehood of the reports.) |Say, for your losses because you could not get telephone service. In between arguing with the creditors who think you owe them money you can argue with the credit bureaus' lawyers about the actual losses caused by your inability to get telephone service. And of course, both are going to demand that you prove that it was not in fact you who did run up the bills. I'd rather just prevent the problem in the first place. Consumer "recourse" is vastly overrated. Dan Lanciani ddl@danlan.*com ------------------------------ Date: Sun, 4 Jan 2009 10:05:54 -0500 From: T <kd1s.nospam@cox.nospam.net> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Reduced spam and increased security infrastructure? Message-ID: <MPG.23ca9a5477dd3b3298984a@reader.motzarella.org> In article <200901040622.BAA10584@ss10.danlan.com>, ddl@danlan.com says... > dave.garland@wizinfo.com (Dave Garland) wrote: > > |Dan Lanciani wrote: > |> dave.garland@wizinfo.com (Dave Garland) wrote: > |> |Credit bureaus sell > |> |information about you... Make them liable for damages if you are harmed in > |> |any way by their sale of untrue information. > |> > |> While I certainly have no objection to such a rule, it does nothing > |> to help the "identify theft" problem where the credit bureau provides > |> true information about the victim... > | > |The "theft" problem is more properly a problem of negligence in > |properly identifying someone when issuing them credit. > > Yes, of course. And given the current structure the simplest solution > is credit inquiry locks. > > |So the perp claims he's you, runs up big bills, and doesn't pay them. > | > |That's really not much of a problem for you, until the credit bureau > |starts telling people it was you who ran up the bills, thus affecting > |your credit. > > It's a problem for you when the people who think you borrowed money > from them try to recover. They often have lawyers who know how to > use the court system to get judgements. > > |If they were liable for the truthfulness of the > |information, you'd have recourse. > > You would not have recourse for the harm caused by the debt which is > now in your name. > > |(They could, of course, contract > |with businesses who report to them, that those business would > |reimburse them for any claims due to the falsehood of the reports.) > |Say, for your losses because you could not get telephone service. > > In between arguing with the creditors who think you owe them money you > can argue with the credit bureaus' lawyers about the actual losses > caused by your inability to get telephone service. And of course, both > are going to demand that you prove that it was not in fact you who did > run up the bills. I'd rather just prevent the problem in the first > place. Consumer "recourse" is vastly overrated. One glitch is that the creditors must PROVE that you agreed to the debt. Most often this is in the form of you signature on a piece of paper. By the time the original creditor does the charge-off and then sells then debt to a collector, the collector only gets a print out andno real supporting paperwork. After so many years even the original debtor destroys paperwork. If you have patience you can beat the system. ------------------------------ Date: Sun, 04 Jan 2009 10:50:02 -0800 From: Steven Lichter <diespammers@ikillspammers.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Reduced spam and increased security infrastructure? Message-ID: <Ex78l.15960$Ws1.2095@nlpi064.nbdc.sbc.com> T wrote: > In article <200901040622.BAA10584@ss10.danlan.com>, ddl@danlan.com > says... >> dave.garland@wizinfo.com (Dave Garland) wrote: >> >> |Dan Lanciani wrote: >> |> dave.garland@wizinfo.com (Dave Garland) wrote: >> |> |Credit bureaus sell >> |> |information about you... Make them liable for damages if you are harmed in >> |> |any way by their sale of untrue information. >> |> >> |> While I certainly have no objection to such a rule, it does nothing >> |> to help the "identify theft" problem where the credit bureau provides >> |> true information about the victim... >> | >> |The "theft" problem is more properly a problem of negligence in >> |properly identifying someone when issuing them credit. >> >> Yes, of course. And given the current structure the simplest solution >> is credit inquiry locks. >> >> |So the perp claims he's you, runs up big bills, and doesn't pay them. >> | >> |That's really not much of a problem for you, until the credit bureau >> |starts telling people it was you who ran up the bills, thus affecting >> |your credit. >> >> It's a problem for you when the people who think you borrowed money >> from them try to recover. They often have lawyers who know how to >> use the court system to get judgements. >> >> |If they were liable for the truthfulness of the >> |information, you'd have recourse. >> >> You would not have recourse for the harm caused by the debt which is >> now in your name. >> >> |(They could, of course, contract >> |with businesses who report to them, that those business would >> |reimburse them for any claims due to the falsehood of the reports.) >> |Say, for your losses because you could not get telephone service. >> >> In between arguing with the creditors who think you owe them money you >> can argue with the credit bureaus' lawyers about the actual losses >> caused by your inability to get telephone service. And of course, both >> are going to demand that you prove that it was not in fact you who did >> run up the bills. I'd rather just prevent the problem in the first >> place. Consumer "recourse" is vastly overrated. > > One glitch is that the creditors must PROVE that you agreed to the debt. > Most often this is in the form of you signature on a piece of paper. > > By the time the original creditor does the charge-off and then sells > then debt to a collector, the collector only gets a print out andno > real supporting paperwork. > > After so many years even the original debtor destroys paperwork. > > If you have patience you can beat the system. For several years I had to fight with creditor and collection scum in Florida. I never lived there or even been there, and all the companies involved were local business. When I got one cleared another would pop up. One little known trick is one collection agency will sell the claim to another one until it gets to one that tries to collect a few dollars. I have told them I'm not the person who they are looking for, but that never seemed to faze them, one told me he did not care if I was not the person, his job with to bug me until I paid. By that time I took to recording all calls, I forwarded it to his company and the Florida Attorney General. End of calls and the charge off for that one was removed from the credit files. Also the credit agency will remove the report if there was no reply from the creditor, but it then can be added back in. That is why I feel that if there were criminal laws they would care a little more. Now if something pops up I know it is not me since all of files are blocked and I have only one credit card with my credit union. -- The Only Good Spammer is a Dead one!! Have you hunted one down today? (c) 2009 I Kill Spammers, Inc. A Rot In Hell Co. ------------------------------ Date: Sun, 4 Jan 2009 17:41:17 -0800 (PST) From: jdp76il@gmail.com To: redacted@invalid.telecom.csail.mit.edu Subject: Re: Any user reviews of the Magic Jack? Message-ID: <0c4c34f6-f318-414c-947f-e4b56d7810e2@g3g2000pre.googlegroups.com> On Dec 19 2008, 1:45 am, T <kd1s.nos...@cox.nospam.net> wrote: > In article <20081217234434.96029.qm...@simone.iecc.com>, jo...@iecc.com > says... > > > Telecom Digest Temporary Moderator wrote: > > >Is "Magic Jack" any different than another VoIP service, such as > > >Vonage? Would your son have been able to accomplish the same goals > > >with a Vonage router in his luggage? > > > It's VoIP in a dongle, priced at a flat $40/yr. You can take along a > > conventional VoIP box and it works (my US Lingo box works great here > > in the UK), but it's a lot bigger. > > Actually the first year is $40 while subsequent years are $20. > > > On the other hand, you need some sort of phone to plug into the Magic > > Jack, so if you have a laptop, it might be easier to use Skype, which > > can call US landlines for 2.4c/min or $2.95/mo with a month to month > > subscription. When I travel internationally, I use Skype with my > > laptop's built in microphone and a pair of tiny earbuds. > > No you don't need a phone for the MagicJack device. If you have a > headset for the computer (earphone and mic) you can use it with > MagicJack. I like the fact that it's flexible like that. > > And as was mentioned ealier, the mp3 voicemail sent as email is great. Magic Jack is [a] good product: we have now had ours for 1 year. ------------------------------ TELECOM Digest is an electronic journal devoted mostly to telecomm- unications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is currently being moderated by Bill Horne while Pat Townson recovers from a stroke. Contact information: Bill Horne Telecom Digest 43 Deerfield Road Sharon MA 02067-2301 781-784-7287 bill at horne dot net Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom Unsubscribe: mailto:telecom-request@telecom-digest.org?body=unsubscribe telecom This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/ (or use our mirror site: ftp.epix.net/pub/telecom-archives) RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html For syndication examples see http://feeds.feedburner.com/telecomDigest Copyright (C) 2008 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of The Telecom digest (8 messages) ****************************** | |