On Sun, Nov 14, 2010 at 10:51 AM, Jan Wildeboer <[email protected]> wrote:

> be excluded under this new doctrine. Think of nmap, wireshark etc. Tools
> that have a perfect use for debugging but can also be used for not-so-good
> things.

Here's the thing here. Nmap and wireshark do not *actively* exploit
systems, nor hold themselves out as tools for doing so. Note that the
language gives the Board the discretion, not the requirement, to deny
inclusion of packages, so an analysis of all existing packages in the
repository is not only not required, it's quite impractical.

-Jon, speaking for himself
-- 
marketing mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/marketing

Reply via email to