Let's here it for Texas and Mass. I think computer geeks should be elected to office, maybe then people would smarten up.

b) Offense defined.--Any person commits an offense if he knowingly:

(1) possesses, uses, manufactures, develops, assembles, distributes, transfers, imports into this state, licenses, leases, sells or offers, promotes or advertises for sale, use or distribution any communication device:

(i) for the commission of a theft of a communication service or to receive, intercept, disrupt, transmit, re-transmits, decrypt, acquire or facilitate the receipt, interception, disruption, transmission, re-transmission, decryption or acquisition of any communication service without the express consent or express authorization of the communication service provider; or

(ii) to conceal or to assist another to conceal from any communication service provider, or from any lawful authority, the existence or place of origin or destination of any communication
"If you send or receive your email via an encrypted connection, you're in violation, because the 'To' and 'From' lines of the emails are concealed from your ISP by encryption. (The encryption conceals the destinations of outgoing messages, and the sources of incoming messages.)

"Worse yet, Network Address Translation (NAT), a technology widely used for enterprise security, operates by translating the 'from' and 'to' fields of Internet packets, thereby concealing the source or destination of each packet, and hence violating these bills. Most security 'firewalls' use NAT, so if you use a firewall, you're in violation.

Full Story