Vendors, CERT and other so called trusted people have been known to leak exploits as well.
On Wed, 29 Jan 2003, Day Jay wrote: > Date: Wed, 29 Jan 2003 14:15:45 -0800 (PST) > From: Day Jay <[EMAIL PROTECTED]> > To: Richard M. Smith <[EMAIL PROTECTED]> > Cc: [EMAIL PROTECTED] > Subject: RE: [Full-Disclosure] [Secure Network Operations, > Inc.] Full Disclosure != Exploit Release > > And what makes you think that you and your friends who > share your dozen exploits are the right hands? What > because you have the skill to write them, you are the > right hands? > > Who decides who can have what? > > That's what I thought. > > > > > OTOH we know that public proof-of-concept examples > > are going to get into > > the wrong hands. > > > > Richard > > > > > __________________________________________________ > Do you Yahoo!? > Yahoo! Mail Plus - Powerful. Affordable. Sign up now. > http://mailplus.yahoo.com > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > -- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- "I don't intend to offend, I offend with my intent" [EMAIL PROTECTED] http://www.nmrc.org/~hellnbak -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
