On 13/04/07, Ajay Pal Singh Atwal <[EMAIL PROTECTED]> wrote:
> I have a question. Letus say some sites of govt of India are affected by 
> vulnerabilities and are more or less sitting ducks and waiting for crackers 
> to deface them, or are already targets of crackers.
> When the issue is reported to CERT-IN, nothing has happened after a month 
> (provided those sites are not acting as honeypots for some secret govt IT 
> security project), what should be the next option. A full-disclosure or 
> silence?
>

Full disclosure is always not good idea. The knee jerk reaction of
babudom is to take you on first (kill the messenger) than try to see
what should be done.
Can we create a hall of vulnerability (like hall of shame by ILUG-D)
and send the link to CERT-IN May be that would wake them up.

Unfortunately few instance in past make me believe that knee jerk
reaction is more likely as you can be charged with "break-in". Logic
(convoluted) is that you can only know if you have breached the sites
and if you have breached you are the target of breaking "governmental"
machinery!!!

Take care.
-- 
Regards,
Sudev Barar

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to