I think the rule goes something like this:
Every communication protocol, application or application feature that anyone can devise will sooner or later be used:
- To transmit or display spam
- To display pornography
- To implement a scam
- All of the above
Addendum: It will happen sooner rather than later.
This topic was automatically closed after 5 days. New replies are no longer allowed.