> Not that the Lab actually needs anything resembling the TPVP to successfully
> take legal action against someone making pernicious viewers available or
> creating them for their own use.

I can use telnet to break into various TCP-based servers, does that
make the authors of my telnet client liable for my actions?

I can also (and have done so as part of a few penetration tests) use
the metasploit framework to break into various machines - are the
authors of metasploit liable for my actions?


Unless there's some precedent to the contrary, it would seem that the
user remains liable and not the developer of the tools
_______________________________________________
Policies and (un)subscribe information available here:
http://wiki.secondlife.com/wiki/OpenSource-Dev
Please read the policies before posting to keep unmoderated posting privileges

Reply via email to