lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1436328866.1669928.1679279853556@ichabod.co-bxl>
Date:   Mon, 20 Mar 2023 03:37:33 +0100 (CET)
From:   James Harkonnen <jamesharkonnen@...lfence.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, fancer.lancer@...il.com,
        kuba@...nel.org, gregkh@...uxfoundation.org
Subject: [RFC] What is the official statement regarding Baikal?

Previously in case of University of Minnesota there was an official email explaining what's going on and why the certain organization has been banned.
In this case there is only random bits circulating on the internet.

----- cut-and-paste from original email -----

I will not stop any kernel developer I trust from taking patches from Russian sources that they in turn trust, but at the same time I will also not override anybody who goes "I don't want to have anything to do with this" and doesn't want to work with Russian companies.

And yes, I realize that you will likely feel this is hugely unfair, and that you had nothing to do with the insanity of your country's politics and leadership.

But I hope I have explained why I don't feel like I should override any maintainer who feels that they cannot work with Russian companies as things stand now.

----- cut-and-paste from original email ends -----

Would you mind confirming if it is genuine?
Do you have a list of potentially banned or affected sources or organizations?
Will the patches be accepted if sent from personal email addresses under different name?

thanks,
james h-n

-- 
Sent with https://mailfence.com  
Secure and private email

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ