tag:blogger.com,1999:blog-5764290.post3200727406471384125..comments2024-03-22T08:01:16.236-04:00Comments on Rebecca Tushnet's 43(B)log: What Ifs and Other Alternative Intellectual Property and Cyberlaw StoriesUnknownnoreply@blogger.comBlogger1125tag:blogger.com,1999:blog-5764290.post-73977910117903934532007-04-02T10:09:00.000-04:002007-04-02T10:09:00.000-04:00Fwiw, whenever you hear a proposal to hack off a b...Fwiw, whenever you hear a proposal to hack off a bit inside the UDP or TCP header and repurpose it to designate objectionable content, you should politely smile and remember <A HREF="http://www.rfc-editor.org/rfc/rfc3514.txt" REL="nofollow">RFC 3514: The Security Flag in the IPv4 Header</A>, by S. Bellovin (April 1st, 2003). The "Evil Bit" specification is a rather famous April Fool's Day RFC.Anonymousnoreply@blogger.com