[opensource-dev] Stuff from my Lunch Bag

Joel Foner joel.foner at gmail.com
Sat Apr 10 08:16:07 PDT 2010

Sometimes it's useful to take a large parallel jump as a way of exploring an
issue. This one just hit me as a direct parallel (riffing on Gareth's idea
below): Is it possible to hold a web browser manufacturer responsible as a
tool to breach security and steal credit card numbers, perform denial of
service attacks and infiltrate secure systems? It would be amusing to see
someone take legal action against Google for the fact that Chrome enabled an
attacker to penetrate a Google internal system someday. Maybe I need coffee
before thinking about this stuff!


On Sat, Apr 10, 2010 at 11:06 AM, Gareth Nelson <gareth at garethnelson.com>wrote:

> > Not that the Lab actually needs anything resembling the TPVP to
> successfully
> > take legal action against someone making pernicious viewers available or
> > creating them for their own use.
> I can use telnet to break into various TCP-based servers, does that
> make the authors of my telnet client liable for my actions?
> Joel
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.secondlife.com/pipermail/opensource-dev/attachments/20100410/42fa8f3e/attachment.htm 

More information about the opensource-dev mailing list