Thomas Bushnell BSG wrote:|
Would you please stop asserting that I'm out to FUD you? Given my history I would hope that you could take for granted that I want what's best for the project.Good grief, this is one of the murkiest areas of American law, and you think that anyone should be convinced of your FUD this way?
I can think of a number of ways for the program to come to someone's attention through operating a Debian system. At that point it need only be traced to its source.Likewise, if a given image, residing in the Debian archive, is nearly unknown to members of the university, and the only people who know about it have deliberately sought it out, then it is extremely unlikely that anyone would find it to be creating a hostile environment.
In your workplace? Au contrare.It is analogous to a copy of Playboy hidden in a drawer somewhere, which is not actionable in the least.
Description: S/MIME Cryptographic Signature