public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: "Paul G. Allen" <pgallen@randomlogic.com>
To: linux-kernel@vger.kernel.org
Subject: Re: [OT] DMCA loop hole
Date: Wed, 01 Aug 2001 17:14:08 -0700	[thread overview]
Message-ID: <3B689B50.33E84D33@randomlogic.com> (raw)
In-Reply-To: <Pine.BSO.4.33.0108010137240.7994-100000@aaieee.daisy-chan.org>

Joshua Jore wrote:
> 
> You know, I've heard this arguement a few times in various contexts and
> it's bothered me everytime. If a virus was designed with specific
> properties that hinder unauthorized copyright infringement then attempts
> to circumvent the limitations would be an example of DMCA circumvention.
> 
> This misses the whole point that in order to deliver the second and more
> important part of the virus requires the author to self-identify to the
> US federal government and somehow get them to prosecute the offender. Now
> at this point, how many of these authors aren't going to be immediately
> charged with something heinous for the act of writting the offensive thing
> in the first place? And do you seriously think you're going to convince
> Ashcroft and company to prosecute Symantec for getting rid of a virus even
> if it is DMCA 'protected'?
> 
> GAAAAA!
> 

It's very simple, and something like this is done all the time in the security industry by people who not only enjoy it, but who get paid to do it.

1)  Discover an exploit or a new way of using a known exploit.
2)  Write a trojan, virus, worm, etc. that takes advantage of the exploit.
3)* Report the exploit to the applicable compan(y/ies), Security Focus, etc. and provide the BINARY of your trojan, virus, or whatever so they can test the
exploit and find a fix.

* Usually people provide the source code as open software. In this case (for this argument) we release it as binary only and keep full rights.

No law was broken when the trojan, virus, etc. was written and no one can (technically) seek prosecution. Under DMCA (at least the way the writers of it have
used it), anyone attempting to reverse engineer your virus (or whatever) and provide an antigen, is liable to you and you can sue them.

To take another angle, those of us who actively look for exploits in software (because companies like M$ fail to do so themselves) risk being sued for doing so.
This makes jobs like mine EXTREMELY difficult because on the one hand I don't want my company using software that will allow Joe Cracker to take over our
machines, and on the other I don't want the company sued just because I did some necessary reverse engineering in order to prevent it (again, because the
software mfg. can't be trusted to do it themselves).

PGA

-- 
Paul G. Allen
UNIX Admin II/Programmer
Akamai Technologies, Inc.
www.akamai.com
Work: (858)909-3630
Cell: (858)395-5043

  parent reply	other threads:[~2001-08-02  0:06 UTC|newest]

Thread overview: 28+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2001-08-01  4:14 [OT] DMCA loop hole James Simmons
2001-08-01  5:45 ` Alexander Viro
2001-08-01  5:49   ` James Simmons
2001-08-01  9:40 ` Paul G. Allen
2001-08-01 10:47 ` Helge Hafting
2001-08-01 11:16   ` Anton Altaparmakov
2001-08-01  6:44     ` Joshua Jore
2001-08-01 13:54       ` Helge Hafting
2001-08-01 17:18       ` [very OT] " Garett Spencley
2001-08-01 20:40         ` Justin Guyett
2001-08-02  0:14       ` Paul G. Allen [this message]
2001-08-03 21:52         ` [OT] " Joseph Pingenot
2001-08-03 22:09           ` Alan Cox
2001-08-03 22:16             ` Joseph Pingenot
2001-08-03 22:45               ` Jakob Østergaard
2001-08-03 22:31             ` nick
2001-08-03 22:46               ` Alan Shutko
2001-08-03 23:45                 ` Paul G. Allen
2001-08-03 22:51               ` Mike Harrold
2001-08-03 23:14                 ` Dan Hollis
2001-08-04  0:51           ` Paul G. Allen
2001-08-04  1:34             ` Rik van Riel
2001-08-11 12:10       ` Pavel Machek
2001-08-14  7:07         ` Joshua b. Jore
2001-08-14 12:36           ` Helge Hafting
2001-08-14 13:17             ` Jan-Benedict Glaw
2001-08-14 14:32             ` Richard B. Johnson
2001-08-14 22:13           ` Paul G. Allen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3B689B50.33E84D33@randomlogic.com \
    --to=pgallen@randomlogic.com \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox