WiFi illegal?

Some interesting points raised by this article about the legalities of wireless access. I think the ending is probably right on:

But ultimately if we want to move to ubiquitous wireless computing, where you can use the WiFi protocols for cheap, mobile VOIP communications, or have near universal wireless Internet access, we are going to have to persuade the law to get the hell out of the way.

Similar Posts

  • This Week’s Links (weekly)

    10 Body Language Tips Every Speaker Must Know (Infographic) tags: Training MM France Just Made It Illegal To Answer Work Emails After 6 P.M. tags: Management MM OLP Launches the First Litigation Support Certification Exam: First of its kind will set industry standards tags: LitSupport MM Mobile Apps Are Killing The Free Web, Handing A…

  • Not exactly good timing

    So with this week being “patch Tuesday” an update to Firefox being released, and work continuing on the intranet, including hacking away at a copy of Xoops, work’s been pretty busy. I’ve got some follow-up work to the website RFP I did for the Friends of the Library due, and some serious writing to work…

  • Home

    I made it home late Friday night. Got a late start from KC and then an unfotunate meeting between a Saturn and a school bus on I-70 in downtown St. Louis created hovac with traffic long enough to turn this trip into something quite a bit longer than I expected it to be. No biggie,…

  • Windows XP patch

    Windows XP patch This is looking like a pretty serious security issue, and everyone is recommending to get it patched immediately. According to the bulletin, you are vulnerable if you are: Customers using Microsoft® Windows® ME or XP, or who have installed the Windows XP Internet Connection Sharing client on Windows 98 or 98SE. Grab…

  • |

    How Phishing is Getting More Targeted

    After reading this article from Inc, I think there are really three things that hackers are taking advantage of, that they didn’t used to, and these are things that we are only just starting to include in anti-phishing training. They are doing research about companies before sending messages. I’ve seen this myself. In the legal…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)