On 14/03/2004, at 11:32, gwallace wrote: > I think listening to someone else's radio is much closer than using > their hammer or stealing their car. I turn on my computer, my airport > automatically connects to the network, my mail downloads by itself > before I even notice I'm connected. Yes, I've "used" the signal being > broadcast by somebody nearby, just like I've listened to the music > being played on the next beach blanket. But I haven't interfered with > anybody else's property and haven't even actually done anything other > than turning my computer on. So, is it my responsibility to search > for the neighbor with the unprotected network so I can ask permission, > or alternately, am I expected to turn airport off when I use my iBook > at home? From the lively debate on this list, it appears that the > answer is far from clear. The problem with a lot of these analogies is that they deal with 'resources,' something that if one takes them another lacks. The truth is though, if a person doesn't know enough to secure their network they likely will never notice someone tapping it. It ain't illegal if no one cares. Jean-Paul