Vulnerability Disclosure Conference at Stanford 6
Jennifer Granick writes "Stanford Law School Center for Internet and Society, headed by Lawrence Lessig and Jennifer Granick, is hosting a day long conference on vulnerability disclosure on November 22, 2003. The point is to get all sorts of people interested in vulnerability disclosure in the same room to discuss the issues and to come up with a clear definition of the problems and the costs and benefits of various solutions. This conference is really a workshop, and security researchers, vendor security teams, and system administrators should all consider attending and participating. For more information:
http://cyberlaw.stanford.edu/security/"
Hmm (Score:1, Insightful)
i think.... (Score:2)
getting them together in this type of setting may convert a few people from one camp to another, make some knowledgable of the arguments at hand, but I doubt it'll do anything useful in the long term to solve the issue because of those who will
depends on the software. (Score:2, Interesting)
net services disclosure remains a huge issue (Score:3, Interesting)
What's the best way to go about disclosing to a company that their network presence is vulnerable? What are the legal ramifications of doing so?
Do no harm (Score:2, Insightful)
Doctors take an oath swearing to not use their medical knowledge to do harm. This is a philosophy the security community should follow.
There is no need to publish the full details of security flaw, including working exploit code, until after the vendor has fixed it and some time has gone by to give people time to apply the fix.
Some people believe they should immediately publish full details and exploit code without bothering with the vendor or without giving them time to fix the problem. That is irre