lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200309111136.37601.jonathan@xcorps.net>
From: jonathan at xcorps.net (Jonathan Rickman)
Subject: Symantec wants to criminalize security info sharing

-----BEGIN PGP SIGNED MESSAGE-----

On Thursday 11 September 2003 09:47, Richard M. Smith wrote:

> For example, if Symantec were to get this law passed, are they prepared
> to see their employees who work on the Bugtraq email list go to jail?

Of course not. They'll just shut it down. They don't want to see 
vulnerabilities discussed openly because that keeps them from being able 
to charge for advisories. The fact that these services still exist is due 
to their fear of community backlash, not corporate goodwill. Don't kid 
yourself, there are plenty of others out there just like them who would 
like nothing more than to make the so called "security community" an 
exclusive club open only to corporate types who see things their way. 
Many of them are among us. Fortunately, in most cases the good they do 
outweighs the ill will that they harbor. Eventually the thirst for more 
revenue will push them over the edge, and I for one, believe that the 
first one to step over that line will suffer such a backlash that the 
others contemplating following them will go back to their corners and 
sulk. If I had to bet on who the first will be, I would probably put my 
money on Symantec. I don't have anything against them particularly, but I 
think they are very close to the edge, as this quote indicates.

- -- 
Jonathan Rickman
Key ID: 0DF501FF

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBP2CWVjTwrX0N9QH/AQFJKQgAr4yad04zS0JRI7EVoODGgK86qBnDMoJh
dWXSk8fHl/kF4KKaxHZg1fTXx4cGRuFPhAEiVuI1NiBFftFPT/l5/xn79ksepNw5
TIfco4GtWji60VYYO2Z0I7Bude4afX2jW6VGzmL+CwMdPHKEWioVowTPh7gI86ss
/aUeGi197qV1xAjv7eK6ESmR8GgpO+dg2YBDpw1cuVFkGOTqT1N/18BDUM1AOqRZ
OORJHOoVyi8yvNIZFRzmKx1sRxAhooFPkNjxoLK3q3+HFc9VvppYTUzM7JI3U2nm
lzZEhr2YqBjcNd7qVfND1ZxEWsLiW6CNlgBfD+wVTpoNwBv+wL5Abg==
=7i1d
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ