On Fri, 2003-01-10 at 06:21, Brian McWilliams wrote: > Like folks said earlier, the "Exploit" tab is missing, but that doesn't > mean the exploit is gone. You just have to dig, starting with the stuff in > the "Credit" tab, to find the SF mailing list message that spawned the BID > in the first place.
It could also be argued that this is the first step in making that information disappear. Keep moving it to raise the doubt that it has not disappeared but one is simply not "digging" deep enough to find it. It also raises the level of friction for workers who have relied on that info being there. Greatly increasing the time required for a task that involves referencing that info in some way. Of course, if this info is core to what someone does they are an idiot for not mirroring the data in some fashion. Never rely on another party for a core dependency. To me, this is the number one reason against proprietary operating systems and applications. -- I think, therefore, ken_i_m Chief Gadgeteer, Elegant Innovations _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
