[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Copyright Misuse Doctrine in Apple v. Psystar

From: Mart van de Wege
Subject: Re: Copyright Misuse Doctrine in Apple v. Psystar
Date: Sun, 22 Feb 2009 18:15:07 +0100
User-agent: Gnus/5.11 (Gnus v5.11) Emacs/22.2 (gnu/linux)

"amicus_curious" <> writes:

> "Mart van de Wege" <> wrote in message
> 86wsbic07e.fsf@gareth.avalon.lan">news:86wsbic07e.fsf@gareth.avalon.lan...
>> "amicus_curious" <> writes:
>>> "David Kastrup" <> wrote in message
>>> 85r61r4nvu.fsf@lola.goethe.zz">news:85r61r4nvu.fsf@lola.goethe.zz...
>>>> "amicus_curious" <> writes:
>>>>> If it fails early, it gets returned to the store or to the
>>>>> manufacturer for credit.
>>>> If your whole computing centre gets compromised because a packet logger
>>>> could be inserted into the router, return to the store is your least
>>>> problem.  Being able to determine possible scope of a security breach is
>>>> certainly important.
>>> You create a whole lot of hypothetical situations, but people buy
>>> these things at Sam's Club for $35 and they work just fine.  What
>>> compromise has there ever been that allowed someone to put a "packet
>>> logger" into the firmware of such a thing?  Who would bother?
>> Spammers who like to build botnets out of domestic PCs for example.
> Do you know of any instance where the botnet was built by compromising
> the user's router firmware?  That is pretty farfetched. 
Yes, and executable e-mails were once considered to be 'purely theoretical'.

I'm sorry, but threat evaluation is just a *tad* more than 'is this
being exploited yet?'


"We will need a longer wall when the revolution comes."
--- AJS, quoting an uncertain source.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]