An end user operating a TOR exit node, or wide open Wireless AP, intentionally allows other people to connect to their infrastructure and the internet whom they have no relationship with or prior dealings with, in spite of the possibility of network abuse or illegal activities, they choose to allow connectivity without first gathering information required to hold the 3rd party responsible for their activity.
Oh please. I don't know where you've been hiding out for the last half a decade or so, but around here, every McDonalds, Starbucks, Sam's Club, Home Depot, Lowe's, and most libraries, hotels, hospitals, and laundromats offer WiFi, and those are just the ones I can readily think of. The level of wishful-thinking implied by the quoted text about how the Internet works is mind-boggling. ... JG -- Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net "We call it the 'one bite at the apple' rule. Give me one chance [and] then I won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN) With 24 million small businesses in the US alone, that's way too many apples.