lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: live4java at stormcenter.net (Mister Coffee) Subject: Re: Cisco's stolen code <big snip> > > But, for realities sake, let's avoid hypothetical's and deal with the > facts; > > The code was stolen, it's been widely announced that it was obtained from > non-legal channels. Now, back to my question; > > how is this different from cquiring stolen property in any other context? > > Thanks, > Ron, My point was strictly an ethical one on doing an audit, and the application of Fair Use in such. As I've tried to point out several times, the acquisition was a separate issue that I'm not going into. I'll let you pursue that with others. Cheers, L4J > > Ron DuFresne > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > "Cutting the space budget really restores my faith in humanity. It > eliminates dreams, goals, and ideals and lets us get straight to the > business of hate, debauchery, and self-annihilation." -- Johnny Hart > ***testing, only testing, and damn good at it too!*** > > OK, so you're a Ph.D. Just don't touch anything. >
Powered by blists - more mailing lists