On 14-Jan-2013 15:39:53 -0500, [email protected] wrote: > > After all, a vulnerability and an exploit are intellectual > > products. Not sure copyright could be claimed, but why not?
> Actually, claimed or not, if the exploit was coded in a Berne > signatory country, it's almost always automatically copyrighted > at creation (most likely to the coder, or to their employer if > it was a work-for-hire). [...] > More interesting is the question of how to enforce a copyright > claim while remaining anonymous... Is it really necessary to stay anonymous? Writing hmmm... articles about vulnerabilities for some (very specific) media and getting a hmmm... fee for that is mostly legal. Opposed to the use of that information... -- Alexey V. Vissarionov aka Gremlin from Kremlin <gremlin ПРИ gremlin ТЧК ru> GPG key ID: 0xEF3B1FA8, keyserver: hkp://subkeys.pgp.net GPG key fingerprint: 8832 FE9F A791 F796 8AC9 6E4E 909D AC45 EF3B 1FA8 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
