doctorow at June 21st, 2014 12:00 — #1
angusm at June 22nd, 2014 13:10 — #2
I think the rule goes something like this:
Every communication protocol, application or application feature that anyone can devise will sooner or later be used:
- To transmit or display spam
- To display pornography
- To implement a scam
- All of the above
Addendum: It will happen sooner rather than later.
doctorow at June 26th, 2014 12:00 — #3
This topic was automatically closed after 5 days. New replies are no longer allowed.