[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <107A63CDD8FCD511BA9F0050BAB07BA82DEB58@NHEX1101>
From: arjen.de.landgraaf at cologic.co.nz (Arjen De Landgraaf)
Subject: CERT, Full Disclosure, and Security By Obsc
urity
What about making it available through www.e-secure-db.us ?
right now it is a frozen copy, last update 30 October 2002.
However, that can be changed.
Arjen
New Zealand
-----Original Message-----
From: Steffen Dettmer [mailto:steffen@...t.de]
Sent: Sunday, 2 February 2003 10:15 a.m.
To: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] CERT, Full Disclosure, and Security By
Obscurity
* Len Rose wrote on Thu, Jan 30, 2003 at 09:22 -0500:
[...]
> With the recent evidence that CERT informed it's paying members about the
> Sapphire SQL worm before the rest of the world should now indicate that
> they too are not a useful resource for timely and open security
information.
[...]
> and the security information it hopes to provide
> may well become illegal (at least here in the US)
>
> To summarize my opinion, I feel that security information must simply be
> made available to as many people as possible as quickly as possible, and
> let corporations, systems staff, and security professionals handle the
> problems. "The public has a right to know.."
So we need a non-US OpenCERT?
When the US laws make it illegal to know about incidents, I think
finally incidents will need to be reported for and from non-US
only, hum.
Aren't the current practices here looking like steps backward?
Still confused...
oki,
Steffen
--
Dieses Schreiben wurde maschinell erstellt,
es tr?gt daher weder Unterschrift noch Siegel.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists