Revealing Security Holes vrs "The Rogue Tracker" type of stories
I believe that the ICT bill makes it illegal for someone to reveal security holes in IT systems. However doesn't investigative journalism stories like the recent "The Rogue Tracker" reveal 'security holes'? So what makes that legal? If one was to discover a security hole in a system, then one can do their own investigative journalism then reveal everything about the security hole. I believe the tracking system is an IT system. And it seems a security hole was revealed. It's like saying half of the companies that claim to have installed a particular firewall might not really have the firewall installed. Revealing security holes might be a necessary evil. Just like how some people might have lived with the false security about their cars, some people might be living with false security about their personal info in IT systems. Just the other day someone posted that s/he had bought something which was wrapped by paper containing security authentication credentials from a bank. Another post showed the lack of experience of a local bank's website programmers that allowed anyone to get the password of one of the subjects in their database system. Now all the funky possible stuff is left to the hacker's imagination who might be sitting in the middle of Migingo, sorry, Mijinjo. o_O?
On Mon, Apr 20, 2009 at 9:07 AM, wesley kiriinya <kiriinya2000@yahoo.com>wrote:
I believe that the ICT bill makes it illegal for someone to reveal security holes in IT systems. However doesn't investigative journalism stories like the recent " The Rogue Tracker" reveal 'security holes'? So what makes that legal? If one was to discover a security hole in a system, then one can do their own investigative journalism then reveal everything about the security hole. I believe the tracking system is an IT system. And it seems a security hole was revealed. It's like saying half of the companies that claim to have installed a particular firewall might not really have the firewall installed.
Wesley, You are trying to impose this analogy where it doesn't quite belong:-) In the case of the tracking system, there was no security hole per se, but a case of fraud. The tracking device was NOT installed. The case ends there. Trying to see that as a "firewall that wasn't installed" is quite off tangent, imho. -- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ "Clothes make the man. Naked people have little or no influence on society." -- Mark Twain
participants (2)
-
Odhiambo Washington
-
wesley kiriinya