lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <j2x1b0d006c1005031046t99360f8fv3cd93c509afc44d7@mail.gmail.com>
Date: Mon, 3 May 2010 10:46:00 -0700
From: Ed Carp <erc@...ox.com>
To: J Roger <securityhocus@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: go public to avoid jail

I can see that you have no experience with the legal system other than
what you've seen on TV (which is, to say, none at all).  If you read
the IRC logs presented by the prosecution, it is pretty clear what the
motive was.  Your "release it to the public and you have no liability"
argument will land you in prison if you try it - go to any attorney
and ask.  Your emotional "prove Stephen is a saint" attempt at
twisting what happens in the legal system doesn't change the FACT that
the burden of proof was easily met by the prosecution and that the
defense's arguments, while designed to sway people more used to
emotional appeals than logic, did little to impress the court, with
very predictable results.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ