Full Disclosure mailing list archives
Re: Cisco's stolen code
From: Seth Alan Woolley <seth () tautology org>
Date: Wed, 26 May 2004 22:10:14 -0700
On Thu, May 27, 2004 at 08:41:27AM +1000, Brad Griffin wrote:
Now that this code is stolen, anyone who has a copy of that code is a suspected thief until such time as they show that they did not steal it, or that they are not an accomplice or have not received stolen property. Holders of the code must (if necessary) show that they are holding the code legitimately.
Innocent until proven guilty is a foreign concept to you? What's this meaningless "must (if necessary)" banter mean? You were accusing me of being the lawyer, remember?
Copyright has three parts of stuff all to do with stealing property and does *not* apply here (not where I come from at least).
Words are not property. I refer: http://www.gnu.org/philosophy/words-to-avoid.html#TOCIntellectualProperty Citizens have a "right" to employment under the Full Employment Acts of 1964, 1978, etc. in the US, too. There's a lot of stolen property in that case, under Greenspan's desk.
That's called Receiving Stolen Property.
No, it is not. Nobody ever took their temporary, state-enforced monopoly right to control duplication by receiving a copy of something after it has been duplicated already. Somebody else received that right. I already posted the USC on the subject. The court can mandate that the code from a particular infringement be destroyed, and that's the extent of it. I pity all the purchasers of MS-DOS 6.0 and 6.2. The stolen "rights" from Stac Electronics should brand them all pirates! Personally, I wouldn't touch the CISCO code with one of those aforementioned ten foot barge poles. However, auditors, if they so choose and plan how they receive the code well, can hold themselves harmless under US law for disclosing security flaws. Tough break for CISCO, and that ends up being a security implication: combine Kerckhoffs Principle with the poorer security of security by obscurity, and soon there shall be a fallout from the forthcoming flaws auditors are sure to find. The beauty of it all is that CISCO can't do a damned thing about it, despite the wishes of WIPO. -- Seth Alan Woolley [seth at positivism.org], SPAM/UCE is unauthorized Key id EF10E21A = 36AD 8A92 8499 8439 E6A8 3724 D437 AF5D EF10 E21A http://smgl.positivism.org:11371/pks/lookup?op=get&search=0xEF10E21A Security Team Leader Source Mage GNU/Linux http://www.sourcemage.org
Attachment:
_bin
Description:
Current thread:
- RE: Cisco's stolen code, (continued)
- RE: Cisco's stolen code Pikett/LKSI (May 26)
- RE: Cisco's stolen code Tobias Weisserth (May 26)
- RE: Re: Cisco's stolen code Glenn_Everhart (May 26)
- Re: Re: Cisco's stolen code Valdis . Kletnieks (May 26)
- Re: Re: Cisco's stolen code Maarten (May 26)
- Question About International Disclosure Tom (May 26)
- Re: Question About International Disclosure Ron DuFresne (May 26)
- RE: Cisco's stolen code Pikett/LKSI (May 26)
- Re: Cisco's stolen code Eric Scher (May 26)
- Re: Re: Cisco's stolen code Valdis . Kletnieks (May 26)
- RE: Cisco's stolen code Brad Griffin (May 26)
- Re: Cisco's stolen code Seth Alan Woolley (May 27)
- Re: Re: Cisco's stolen code tcleary2 (May 26)
- Re: Re: Cisco's stolen code tcleary2 (May 26)
- Re: Re: Cisco's stolen code tcleary2 (May 26)
- RE: Cisco's stolen code Brad Griffin (May 27)
- Re: Cisco's stolen code Seth Alan Woolley (May 27)
- RE: Cisco's stolen code Ng, Kenneth (US) (May 27)
- Re: FW: Re: Cisco's stolen code Maarten (May 27)
- Re: FW: Re: Cisco's stolen code ktabic (May 28)
- RE: Re: Cisco's stolen code Brown, James (Jim) (May 27)
