On Wed, 8 May 1996, Stefan Gal wrote:
> Given the fact that lawyers are particularly good at getting evidence "thrown out"
> (regardless of whether or not they understand it), is it possible to set up a system
> where the "logs" could be used or proven as valid evidence?
> Before this thread gets out of hand, I would like to say that I am glad to
> see the interest and comments regarding the this Fakemail thread and the prior one
> that sparked my initial reply.
I am afraid of it getting out of hand, especially as it's not really
related to firewalls at all, except for the fact that those, like every
*other* system I have, generate logs. This list has been too noisy
Not that this isn't an interesting topic. I humbly suggest that those
interested in such subjects consider joining the LACC (Legal Aspects of
Computer Crime) list hosted by Julian Assange at suburbia.net. I think
Julian hangs around this list too; perhaps he could comment on whether
this discussion is welcome there (or has already occured.) To
subscribe, send mail to lacc-request @
net with the body of: