Specific examples can be found in Posts #7247 & #7207.
In
7207, I provided a link to Fiddler. If
providing instructions to a 3rd party software somehow makes me guilty of violating KVS agreement, then what should we conclude when you
provided instructions on how to obtain an unauthorized GTC account as it relates to "unauthorized access” legislation such as 18 U.S.C. § 1030?
In
7247, I’m monitoring traffic running on my machine. Once Fiddler is running, it monitors all HTTP traffic regardless of client.
- So are you saying that if one installs KVS, one cannot look at the logs generated by Fiddler?
- What about the ones generated by their router?
- What about firewire logs?
- Or perhaps you are suggesting that donors need explicit permission from KVS to look at their logs if KVS is installed?
- Or are you saying KVS should be installed on a machine solely dedicated to KVS so that there can be no confusion as to why a donor would have a need to look at their network logs?
I also love the part "proprietary algorithms or data (including, but not limited to, Bookmarks)." Are there actually any
proprietary bookmarks in KVS?