<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><br class=""><div><br class=""><blockquote type="cite" class=""><div class="">On Oct 3, 2018, at 12:12 PM, Jack Haverty <<a href="mailto:jack@3kitty.org" class="">jack@3kitty.org</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><div class="">...<br class=""><br class="">At Oracle, we had our own world-wide internet, and assigned our own IP<br class="">addresses, regardless of whether or not the particular number was in use<br class="">in the public Internet. But we were connected to the Internet through<br class="">computers which were dual-homed, and thus could receive email, use FTP,<br class="">etc. as needed. We could interact with the obvious players, e.g.,<br class="">Yahoo!, but also with computers inside our customers' private internets.<br class=""></div></div></blockquote><div><br class=""></div><div>I would call that “accessing Internet content”, but definitely NOT being “on the Internet” (note: I appreciate this also applies to nearly all consumer access because of NATs).</div><div><br class=""></div><div>Being “on the Internet” IMO has minimum requirements; I presented these as candidate requirements at a meeting in 2004:</div><div><br class=""></div><div>Internet User “Bill of Rights"</div><div>
<!--StartFragment--><p style="margin-top: 3.84pt; margin-bottom: 6pt; margin-left: 0in; text-indent: 0in; direction: ltr; unicode-bidi: embed; vertical-align: baseline; font-size: 8px;" class=""><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50);" class="">The
Internet is an association of communicating parties. Consenting parties should
be able to communicate in an unrestricted fashion, insofar as they do not
impinge on the corresponding rights of other parties. The following is a list
of specific rights to that end:</span></p><p style="margin-top: 3.84pt; margin-bottom: 6pt; margin-left: 0in; text-indent: 0in; direction: ltr; unicode-bidi: embed; vertical-align: baseline; font-size: 8px;" class=""><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50); font-weight: bold;" class="">1.
REAL IP</span><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50);" class="">:
Users have the right to a real IP address, routable from anywhere on the
Internet.</span></p><p style="margin-top: 3.84pt; margin-bottom: 6pt; margin-left: 0in; text-indent: 0in; direction: ltr; unicode-bidi: embed; vertical-align: baseline; font-size: 8px;" class=""><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50); font-weight: bold;" class="">2.
REAL DNS (& REVERSE-DNS)</span><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50);" class="">: Users have the right to a valid reverse
DNS name for that IP address, and the forward lookup of that name that matches
that address.</span></p><p style="margin-top: 3.84pt; margin-bottom: 6pt; margin-left: 0in; text-indent: 0in; direction: ltr; unicode-bidi: embed; vertical-align: baseline; font-size: 8px;" class=""><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50); font-weight: bold;" class="">3.
RECEIVE ANY</span><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50);" class="">:
Users have the right to receive any valid IP packet, using any valid transport
protocol on any valid port (if applicable), up to the limits of their local
resources and network connection.</span></p><p style="margin-top: 3.84pt; margin-bottom: 6pt; margin-left: 0in; text-indent: 0in; direction: ltr; unicode-bidi: embed; vertical-align: baseline; font-size: 8px;" class=""><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50); font-weight: bold;" class="">4.
SEND ANY</span><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50);" class="">:
Users have the right to send any valid IP packet to any valid real IP address,
using any transport protocol, on any valid port (if applicable), provided it
uses an inconsequential amount of resources of the network and potential
receiver until mutual consent is established.</span></p><p style="margin-top: 3.84pt; margin-bottom: 6pt; margin-left: 0in; text-indent: 0in; direction: ltr; unicode-bidi: embed; vertical-align: baseline; font-size: 8px;" class=""><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50); font-weight: bold;" class="">5.
ENFORCEMENT</span><span style="font-size: 13.333333969116211px; font-family: Arial; color: rgb(50, 50, 50);" class="">:
Users have the right to know the ISP responsible for traffic from any valid IP
address, sufficient to register a complaint regarding violations of any of
these rules. </span></p>
<!--EndFragment--></div><div>——</div><div>Everything else is, at best, access to Internet *information* but undermines the ability to participate directly in Internet protocols themselves. That’s sort of like saying you can watch TV, but only from still photos taken across the street through a smudged window.</div><div><br class=""></div><div>Calling that “the Internet” isn’t evolution of terms to common usage. It’s misleading advertising.</div><div><br class=""></div><div>Joe</div><div><br class=""></div></div></body></html>