lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <025B5895F8BCCC40AC35F6CD6D972B1C024A1C596E@cca-mail1.commonwealthcare.org>
Date: Tue, 15 Jan 2013 10:40:47 -0500
From: "Mikhail A. Utin" <mutin@...monwealthcare.org>
To: Christian Sciberras <uuf6429@...il.com>, Valdis Kletnieks
	<Valdis.Kletnieks@...edu>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: how to sell and get a fair price

In general practice, where ever you would like to publish, the publisher will ask for copyright rights. Thus, a site publishing exploits can do the same and thus may protect rights of the author, well, together with its ones.
After all, my idea was about fare sale, and that could require release of rights to the mediator/auctioneer.
Somebody I would bet is having a fair thought "buddy, would you do your idea?" I need to say frankly that I do not plan. I'm stretched by my current www.201cmr1700ma.com<http://www.201cmr1700ma.com> and its very likely extension. But feeling unfairness, will be glad to support and devout some time.

Regards

Mikhail

From: Christian Sciberras [mailto:uuf6429@...il.com]
Sent: Monday, January 14, 2013 4:17 PM
To: Valdis Kletnieks
Cc: Mikhail A. Utin; full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] how to sell and get a fair price

Valdis, we've had spam companies suing blacklist/antispam companies before...
Surely an anonymous person legitimately and legally enforcing copyright can't be harder?


On Mon, Jan 14, 2013 at 9:39 PM, <Valdis.Kletnieks@...edu<mailto:Valdis.Kletnieks@...edu>> wrote:
On Thu, 10 Jan 2013 12:03:03 -0500, "Mikhail A. Utin" said:

>  After all,a  vulnerability and an exploit are intellectual products. Not
> sure copyright could be claimed, but why not?
Actually, claimed or not, if the exploit was coded in a Berne signatory
country, it's almost always automatically copyrighted at creation (most likely
to the coder, or to their employer if it was a work-for-hire).  In the US,
there's a exemption for work product of federal employees - that's one of
the few ways for US-produced material to become public domain (expiration of
term is the other one, but with ever-increasing copyright terms, it's unclear
that anything will ever actually expire in the US).

More interesting is the question of how to enforce a copyright claim
while remaining anonymous...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


CONFIDENTIALITY NOTICE: This email communication and any attachments may contain confidential 
and privileged information for the use of the designated recipients named above. If you are 
not the intended recipient, you are hereby notified that you have received this communication 
in error and that any review, disclosure, dissemination, distribution or copying of it or its 
contents is prohibited. If you have received this communication in error, please reply to the 
sender immediately or by telephone at (617) 426-0600 and destroy all copies of this communication 
and any attachments. For further information regarding Commonwealth Care Alliance's privacy policy, 
please visit our Internet web site at http://www.commonwealthcare.org.

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ