On Jul 30, 2013, at 12:01 AM, Antoine Pitrou <solip...@pitrou.net> wrote:

> Donald Stufft <donald <at> stufft.io> writes:
>> 
>> I have zero qualms about releasing a full disclosure along with working
> exploits
>> into the wild for a security vulnerability that people block me on. If I'm
> unable
>> to rectify the problem I will make sure that everyone *knows* about the
> problem.
> 
> I don't know what I'm supposed to infer from such a statement, except that I
> probably don't want to trust you. You might think that "publish[ing] working
> exploits into the wild" is some kind of heroic, altruistic act, but I think 
> few
> people would agree.

No, this is the standard for security researchers. If the vendor ignores the 
reported exploit for long enough, they go public and try to make sure users 
understand the risks and how to mitigate them in the time it takes the vendor 
to fix it.

--Noah

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Distutils-SIG maillist  -  Distutils-SIG@python.org
http://mail.python.org/mailman/listinfo/distutils-sig

Reply via email to