<HTML><HEAD></HEAD>
<BODY dir=ltr>
<DIV dir=ltr>
<DIV style="FONT-SIZE: 12pt; FONT-FAMILY: 'Calibri'; COLOR: #000000">
<DIV>Hi Andre,</DIV>
<DIV>I wrote that the group was one step closer to doing what <SPAN
style="FONT-FAMILY: ; WHITE-SPACE: normal; WORD-SPACING: 0px; TEXT-TRANSFORM: none; FLOAT: none; COLOR: ; TEXT-ALIGN: left; ORPHANS: 2; WIDOWS: 2; DISPLAY: inline !important; LETTER-SPACING: normal; LINE-HEIGHT: 36px; TEXT-INDENT: 0px; font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px">Friedrich
Nietzsche did in the century XIX discussing On the Genealogy of Morality... my
mistake. </SPAN></DIV>
<DIV>With my professional and cultural background, I tend to believe that in
communities like this, the objectives may be altruistic.</DIV>
<DIV>But reading this discussion get the impression of not declarable goals.
Excuse me if I'm wrong.</DIV>
<DIV> </DIV>
<DIV>On 25 Aug 2016 05:40 PM, Gunther wrote to Andre:</DIV>
<DIV>> My intent is to have a most broad definition of abuse as
possible.<BR>> You seem to intentionally want to restrict this definition. I
just don't know why.</DIV>
<DIV> </DIV>
<DIV>I do not know why too.</DIV>
<DIV> </DIV>>> It is the RIPE Anti Abuse WG --- We discuss network
abuse.... (Andre)<BR>> Well, I do not see very much discussing here - just a
very "blocking" attitude. (Gunther)
<DIV> </DIV>
<DIV>I agree with “just a very blocking attitude”.</DIV>
<DIV> </DIV>
<DIV>On 25 Aug 2016 06:14 PM, Andre wrote:</DIV>
<DIV>> So, if you could please just provide a real world example of Internet
abuse where there is a single resource, that would be very helpful.</DIV>
<DIV> </DIV>
<DIV>I have a real world example of Internet abuse:</DIV>
<DIV>When people whose pc's has been stolen or abused in their homes.</DIV>
<DIV> </DIV>
<DIV>Exactly the example you used to explain what is not internet abuse. If
someone had their home PC infected or abused, it's because someone used the
means and tools provided by RIRs, Registrars and ISPs.</DIV>
<DIV>And the ISP, owner of this domain, has to take the measures stated in the
contract and AUP. And for both, identifying who committed the offense must be
available on the Whois for the owner of the invaded PC. Otherwise it will not be
abuse, will be crime - conspiracy.</DIV>
<DIV> </DIV>
<DIV>So, Andre, do not complicate. It's all so obvious... All abuse committed
via the Internet is Internet abuse and abuse occurs when you do not respect the
rights of someone, company or institution. And no matter in what hole of the
world is the victim.</DIV>
<DIV> </DIV>
<DIV>Thank you</DIV>
<DIV>Marilson</DIV></DIV></DIV></BODY></HTML>