(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

再保险:v 5.3 (dcl)



我的一些改变大卫的副本,包括添加几句话从凯文Ziese。我的变化符合以下类别:1)进一步降低一些句子(但别人;这是大约15字比大卫的草案)2)更加谨慎词选择。例如,我试图把这个词“利用”。That word is not used in the treaty, and can have negative connotations to some people. 3) removed repeated use of the same word in adjoining sentences (e.g., "vulnerability" was overused) 4) changed us from "experts" to "leaders" (instead of being pointy-headed geeks we are now peers of a sort) 5) Changed sense in a few places so that it implies that *anyone* can develop and use security software; previous wording implied that we were only concerned about professionals being able to use it. 6) Added explicit statement about not criminalizing the technology. 7) Added back in statement about contacting us for future assistance. I've written about a dozen of these for ACM over the last 2 years and I can tell you that precision and brevity are important. So we should all look at this to be certain that there are no statements that could be misinterpreted. Cheers, --spaf ============= Greetings: As leading security practitioners, educators, vendors, and users of information security, we wish to register our opinions about the Council of Europe draft treaty on Crime in Cyberspace. We are concerned that portions of the proposed treaty may result in criminalizing techniques and software commonly used to make computer systems resistant to attack. Signatory states passing legislation to implement the treaty may thus endanger the security of their computer systems, computer users in those countries may not be able to adequately protect their computer systems, and education of information protection specialists may be hindered. Critical to the protection of computer systems and infrastructure is the ability to test software for weaknesses, verify the presence of defects in existing systems, and exchange vulnerability information. System administrators, researchers, consultants and companies all routinely develop, use, and share software designed to exercise known and suspected vulnerabilities. Academic institutions use software designed to probe vulnerabilities to educate students and in research to develop improved defenses. Our experience with these tools suggest that it is impossible to reliably distinguish software used in computer crime from that used for these legitimate purposes -- and that often it is identical. Currently, article 6 of the draft treaty is vague regarding the use, distribution, and possession of software that could be used to violate the security of computer systems. We agree that damaging or breaking into computer systems is wrong and we unequivocally support laws against such inappropriate behavior. However, legislation that criminalizes security software development and use would adversely impact security practitioners, researchers, and educators working to prevent computer misuse. The goal of the treaty and resulting legislation should be to permit the development and application of good security measures, and a prohibition against development or circulation of security tools and information is counter to that goal. Therefore, we respectfully request that the treaty drafters remove section a.1 from article 6, and modify section b accordingly; the articles on computer intrusion and damage (viz., articles 1-5) are already sufficient to proscribe any improper use of security-related software or information. Please do not hesitate to call on us for technical advice in your future deliberations. Signed,   <affiliation> "Organizational affiliations are listed for identification purposes only, and do not necessarily reflect the official opinion of the affiliated organization."</pre>
    <!--X-Body-of-Message-End-->
    <!--X-MsgBody-End-->
    <!--X-Follow-Ups-->
    <hr>
    <ul>
     <li><strong>跟进</strong>:<ul>
       <li><strong><a name="00093" href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/msg00093.html">v 5.4 -戴夫·曼</a></strong>
        <ul>
         <li><em>来自:</em>戴夫·曼< dmann@bindview.com ></li>
        </ul></li>
      </ul></li>
    </ul>
    <!--X-Follow-Ups-End-->
    <!--X-References-->
    <ul>
     <li><strong>引用</strong>:<ul>
       <li><strong><a name="00083" href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/msg00083.html">再保险:v 5.3 (dcl)</a></strong>
        <ul>
         <li><em>来自:</em>大卫·勒布朗< dleblanc@microsoft.com ></li>
        </ul></li>
      </ul></li>
    </ul>
    <!--X-References-End-->
    <!--X-BotPNI-->
    <ul>
     <li>上一页的日期:<strong><a href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/msg00090.html">再保险:第二网络犯罪条约草案声明</a></strong></li>
     <li>下一个按日期:<strong><a href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/msg00092.html">有点不稳定</a></strong></li>
     <li>Prev线程:<strong><a href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/msg00083.html">再保险:v 5.3 (dcl)</a></strong></li>
     <li>下一个线程:<strong><a href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/msg00093.html">v 5.4 -戴夫·曼</a></strong></li>
     <li>指数(es):<ul>
       <li><a href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/maillist.html"><strong>日期</strong></a></li>
       <li><a href="//www.rongyidianshang.com/cve/cve/data/board/archives/2000-05/threads.html"><strong>线程</strong></a></li>
      </ul></li>
    </ul>
    <!--X-BotPNI-End-->
    <!--X-User-Footer-->
    <!--X-User-Footer-End-->
   </div>
   <!-- end content pane -->
  </div>
  <!--/Page-->
  <!--Footer-->
  <div id="FootPane" class="noprint">
   <div id="footbar">
    <span style="font-weight:bold">页面最后更新或审查:</span>2007年5月22日,</div>
   <div>
    <div id="Footer">
     <table>
      <tbody>
       <tr>
        <td>
         <div class="noprint" style="font-size:70%; text-align:center; padding-top:0px; padding-bottom:3px;">
          <b><a href="//www.rongyidianshang.com/cve/sitemap.html">站点地图</a>|<a target="_blank" href="https://www.cve.org/Legal/TermsOfUse">使用条款</a>|<a target="_blank" href="https://www.cve.org/Legal/PrivacyPolicy">隐私政策</a>|<a target="_blank" href="//www.rongyidianshang.com/cveform/">联系我们</a>|遵循CVE</b>
          <a target="_blank" href="https://twitter.com/CVEnew/"><img src="//www.rongyidianshang.com/cve/images/twitter.jpg" width="20" height="20" style="border:0;vertical-align:right;margin-left:3px;margin-right:3px;" alt="推特" title="@CVEnew Twitter"></a>
          <a target="_blank" href="https://www.linkedin.com/company/cve-program"><img src="//www.rongyidianshang.com/cve/images/linkedin.jpg" width="20" height="20" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" alt="LinkedIn" title="CVE on LinkedIn"></a>
          <a target="_blank" href="https://github.com/CVEProject"><img src="//www.rongyidianshang.com/cve/images/GitHub_round_sm" width="20" height="20" style="border:0;vertical-align:right;margin-left:0px;margin-right:1px;" alt="GitHub" title="CVEProject on GitHub"></a>
          <a target="_blank" href="https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/"><img src="//www.rongyidianshang.com/cve/images/youtube.png" width="22" height="20" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" alt="YouTube" title="CVE on YouTube"></a>
          <a target="_blank" href="https://medium.com/@cve_program"><img src="//www.rongyidianshang.com/cve/images/medium.png" width="20" height="20" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" alt="媒介" title="CVE on Medium"></a>
          <a href="//www.rongyidianshang.com/cve/find/index.html"><img src="//www.rongyidianshang.com/cve/images/search_icon.png" width="21" height="21" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" title="Search CVE Website"></a>
         </div></td>
       </tr>
       <tr>
        <td><p>CVE®列表的使用和相关的引用从这个网站的<a href="//www.rongyidianshang.com/cve/about/termsofuse.html">使用条款</a>。CVE赞助的<a href="https://www.dhs.gov/" target="_blank">美国国土安全部</a>(DHS)<a href="https://www.dhs.gov/cisa/cybersecurity-division/" target="_blank">网络和基础设施安全机构</a>(CISA)。版权©1999 - 2023,<a href="//www.rongyidianshang.com/cve/" target="_blank">manbetx客户端首页</a>。CVE和CVE标志是斜方公司的注册商标。manbetx客户端首页</p></td>
       </tr>
      </tbody>
     </table>
     <!--/Footer-->
    </div>
   </div>
   <!-- Google Analytics -->
   <!-- End Google Analytics -->
  </div>
 </body>
</html>