Sometimes it's useful to take a large parallel jump as a way of exploring an issue. This one just hit me as a direct parallel (riffing on Gareth's idea below): Is it possible to hold a web browser manufacturer responsible as a tool to breach security and steal credit card numbers, perform denial of service attacks and infiltrate secure systems? It would be amusing to see someone take legal action against Google for the fact that Chrome enabled an attacker to penetrate a Google internal system someday. Maybe I need coffee before thinking about this stuff!
Joel On Sat, Apr 10, 2010 at 11:06 AM, Gareth Nelson <gar...@garethnelson.com>wrote: > > Not that the Lab actually needs anything resembling the TPVP to > successfully > > take legal action against someone making pernicious viewers available or > > creating them for their own use. > > I can use telnet to break into various TCP-based servers, does that > make the authors of my telnet client liable for my actions? > > Joel
_______________________________________________ Policies and (un)subscribe information available here: http://wiki.secondlife.com/wiki/OpenSource-Dev Please read the policies before posting to keep unmoderated posting privileges