Forgot your password?
typodupeerror

Comment: Re:For everything there is a season (Score 3, Informative) 228

by reve_etrange (#48137991) Attached to: Pentagon Unveils Plan For Military's Response To Climate Change

you should be worried.

Not really. Even without any containment measures, an infected person passes the disease to only 1 other person. If there was a disease as deadly as Ebola, where that number was ~20 people (as it is with measles for example), then I would be worried.

The low transmission rate is why the outbreak has fewer than 10,000 people after several months.

Comment: Re:Sounds like a planned PR stunt to me. (Score 1) 622

by reve_etrange (#48137965) Attached to: The Correct Response To Photo Hack Victim-Blamers
I think that "copyright infringement" and "theft/larceny" are essentially legal terms with specific meanings, while "sex crime" is not. Unauthorized access and distribution of these photographs is sexually motivated, which makes it reasonable to describe the crimes in question (i.e. unauthorized use of a computer and copyright infringement) as "sex crimes."

Comment: Re:Straw Man (Score 0) 622

by reve_etrange (#48134645) Attached to: The Correct Response To Photo Hack Victim-Blamers

a reasonable expectation of privacy

You do not understand the meaning of this phrase. It makes no reference to the existence of technological barriers, of any kind, to the breach of privacy. You have a reasonable expectation of privacy for a sealed envelope, even though it is trivial to read the contents of that envelope.

Comment: Re:Sounds like a planned PR stunt to me. (Score 0) 622

by reve_etrange (#48134453) Attached to: The Correct Response To Photo Hack Victim-Blamers

Under current US law, obtaining unauthorized access to privately served files is clearly criminal. Nude photographs are of note solely due to their sexual content.

Can you explain why you think it is incorrect or illogical to describe crimes pertaining to sex or sexual content as "sex crimes?"

Life would be so much easier if we could just look at the source code. -- Dave Olson

Working...