tag:blogger.com,1999:blog-37798047.post7902007880819855941..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: Some notes about WassenaarDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-37798047.post-28280617746669554862020-07-31T08:26:35.621-04:002020-07-31T08:26:35.621-04:00This comment has been removed by a blog administrator.Jackson Raymondhttps://www.blogger.com/profile/00297870670330392916noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-20650535519278434762015-06-02T03:12:00.032-04:002015-06-02T03:12:00.032-04:00Because it's title states, these types of fina...<br /> Because it's title states, these types of financial situation are provided from the vehicle name of the candidate. Essentially, these types of are guaranteed loans which are agreed to the folks that have taken the vehicle name on the title and prepared to place it because security from the loan quantity. <br />payday loans for bad credit @ http://badcreditpaydayloansx.co.uk/<br />loans for bad credit @ http://badcreditpaydayloansx.co.uk/Anonymoushttps://www.blogger.com/profile/02100820139649176665noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-3253599458511230312015-06-01T01:44:05.668-04:002015-06-01T01:44:05.668-04:00Unemployed Payday loans @ http://www.waytoloans.co...Unemployed Payday loans @ http://www.waytoloans.com/unemployed-payday-loans.html<br />Payday Laons @ http://www.waytoloans.com/payday-loans.html<br />Unsecured Tenant Loans for Bad Credit @ http://www.waytoloans.com/unsecured-loans-for-bad-credit.html<br />Unsecured Tenant Loans @ http://www.waytoloans.com/unsecured-tenant-loans.html<br />Faxless Payday Loans @ http://www.waytoloans.com/faxless-payday-loans.htmlAnonymoushttps://www.blogger.com/profile/04348809331614020491noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-1204283261323443632015-05-29T18:34:26.425-04:002015-05-29T18:34:26.425-04:00Shoulda said, wassa wassanar?Shoulda said, wassa wassanar?Ryanhttps://www.blogger.com/profile/11784405906174658860noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-57213789937435368652015-05-27T12:46:08.865-04:002015-05-27T12:46:08.865-04:00I agree with what @CDA said on twitter - the 15 CF...I agree with what @CDA said on twitter - the 15 CFR 734.3 exceptions for "publicly available technology and software" probably cover your scenario where the researcher hasn't published the code yet, but intends to. This is different from the "open source" exceptions that we're used to dealing with in the context of encryption. The 734.3 exemptions don't apply to encryption software. Apparently, they do apply to "intrusion software," and they apply regardless of whether or not the thing being disseminated is open source. <br /><br />The problem comes up where the researcher doesn't intend to publish the exploit - they intend to only disclose to the software vendor that makes the vulnerable product, and they are doing that across a border, or they if they sell the exploit to a bug bounty program. Bug bounty programs and coordinated disclosures play a big role in information security and the government shouldn't be interfering with them.@_decius_https://www.blogger.com/profile/07880237225381932278noreply@blogger.com