Full Disclosure mailing list archives
Re: Re: Cisco's stolen code
From: Maarten <fulldisc () ultratux org>
Date: Wed, 26 May 2004 20:46:33 +0200
On Wednesday 26 May 2004 16:11, Glenn_Everhart () bankone com wrote:
Possession of the code does not prove one has copied it though. If someone posts it on usenet, he is copying it to numerous servers, but the recipient is certainly not acting as the copying agent. Similar
You have a twisted concept of what "a copy" is. Ik someone downloads it, they DO make a copy; from the usenet server TO your machine. Even if you 'merely view' it on a webpage, you still make a copy. You make a copy to your RAM, and to your browsers' cache dir. The law doesn't really give a shit whether the copy is volatile (RAM) or not. In a court of law, you may be judged differently if instead of having burned a CDrom of the offending code it is only found in your browsers' cache. But still, that is subject to how the court interprets the law in every individual case. But the law in itself is quite rigid, and you must assume that viewing IS copying when it comes to digital media. Disclaimer: IANAL but I do read a lot on the subject.
if someone who has the code does ftp send to drop copies on someone else's server: the person who receives such a copy is not the one who performed the copy action.
Not in that case, no. It probably all depends on who initiated it though. If the receiving party has actively invited the upload, chances are the receiver is in trouble. It's like with Spam / UCE: if you receive material that is deemed illegal in your state, there is no problem. But if you save, collect, or keep that content however, you probably are...
If one received such a copy, the copyright principles would seem to govern: fair use copy of parts might be ok, wholesale probably not, though an interesting argument can be made for looking for security holes as a part of protecting one's own network. If you are in the habit of looking at code that arrives on your doorstep in the course of protecting your net, the US Code title might govern.
This is all academic until you actually receive stuff on your doorstep and still can prove that you did not in any way sollicit it. Good luck there...
Still, it can be a major hassle to show that the code arrived unasked for at your door and it can be a hassle having people suspect your work might have derived from too-large-for-fair-use pieces thereof. I advise against seeking it or messing with it unbeknownst to the owners.
Yeah, precisely. Maarten
-----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com]On Behalf Of Tobias Weisserth Sent: Wednesday, May 26, 2004 4:39 AM To: full-disclosure () lists netsys com Subject: Re: [Full-disclosure] Re: Cisco's stolen code Hi Eric, On Wed, 2004-05-26 at 01:54, Eric Scher wrote:---------------------------------------------------------On Tue, 2004-05-25 Tobias W. wrote: Well, let's face the simple facts. Cisco's code is copyrighted and it's illegal to copy it, distribute it or even use it. There's no way around it.---------------------------------------------------------- STATEMENT: "There's no way around it." RESPONSE: I beg to differ. No disrespect intended, but given the mission statement for the Full Disclosure mailing list, the use of the "stolen code" clearly falls under the "FAIR USE" exemption of copyright law. Having said that, there may be criminal and civil liability issues involved in possessing, transfering or receiving said code, but it is manifestly not a violation of copyright law. ========================================== UNITED STATES CODE - TITLE 17 - CHAPTER ONE - SECTION 107 Sec. 107. - Limitations on exclusive rights: Fair use Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include - (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors ==========================================As has been pointed out by Valdis, "fair use" certainly doesn't cover the distribution and copying of hundreds of megabytes of Cisco code that wasn't to end up on the Internet in the first place. The intentions, so for example security code audits, don't matter for determining "fair use" either. If we were to decide for ourselves what we define as fair use then there'd be no use for copyright at all since we would be using everything under "fair use". Whatever we do with code we would always define it "for educational purposes". And since you quoted only US law you should be aware that things might actually look a little different now that you have the DMCA. And let's just go a step further. Do we really /want/ to look at code that hasn't been licensed to us? Why /should/ we want to do this? So anytime in the future we are being creative Cisco can claim we must have copied it from their source code since we obviously "took a look at it"?! Closed source products don't become "Open" Source products over night just because the code leaked into the Internet. They stay closed source. Without a corresponding license the availability of Cisco's code (or any other) is useless. The "fair use" thing is an illusion here. But it isn't an illusion big enough to cover the legal risks that are obvious if you touch unlicensed propriety code. regards, Tobias _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html ********************************************************************** This transmission may contain information that is privileged, confidential and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is STRICTLY PROHIBITED. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format. Thank you ********************************************************************** _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
-- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Re: Cisco's stolen code, (continued)
- Re: Re: Cisco's stolen code Paolo Mattiangeli (May 26)
- Re: Re: Cisco's stolen code Jason Weisberger (May 26)
- Re: Cisco's stolen code Rodrigo Gutierrez (May 26)
- Re: Re: Cisco's stolen code Mister Coffee (May 26)
- Re: Re: Cisco's stolen code Marek Isalski (May 26)
- Re: Cisco's stolen code Cold Fire (May 26)
- RE: Cisco's stolen code Pikett/LKSI (May 26)
- RE: Cisco's stolen code Tobias Weisserth (May 26)
- RE: Re: Cisco's stolen code Glenn_Everhart (May 26)
- Re: Re: Cisco's stolen code Valdis . Kletnieks (May 26)
- Re: Re: Cisco's stolen code Maarten (May 26)
- Question About International Disclosure Tom (May 26)
- Re: Question About International Disclosure Ron DuFresne (May 26)
- Re: Re: Cisco's stolen code Valdis . Kletnieks (May 26)
- Re: Cisco's stolen code Seth Alan Woolley (May 27)