Sometimes it's useful to take a large parallel jump as a way of exploring an
issue. This one just hit me as a direct parallel (riffing on Gareth's idea
below): Is it possible to hold a web browser manufacturer responsible as a
tool to breach security and steal credit card numbers, perform denial of
service attacks and infiltrate secure systems? It would be amusing to see
someone take legal action against Google for the fact that Chrome enabled an
attacker to penetrate a Google internal system someday. Maybe I need coffee
before thinking about this stuff!

Joel

On Sat, Apr 10, 2010 at 11:06 AM, Gareth Nelson <gar...@garethnelson.com>wrote:

> > Not that the Lab actually needs anything resembling the TPVP to
> successfully
> > take legal action against someone making pernicious viewers available or
> > creating them for their own use.
>
> I can use telnet to break into various TCP-based servers, does that
> make the authors of my telnet client liable for my actions?
>
> Joel
_______________________________________________
Policies and (un)subscribe information available here:
http://wiki.secondlife.com/wiki/OpenSource-Dev
Please read the policies before posting to keep unmoderated posting privileges

Reply via email to