Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <56DC7B1E.4050507@oracle.com>
Date: Sun, 06 Mar 2016 10:46:54 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
CC: Art Manion <amanion@...t.org>, Kurt Seifried <kseifried@...hat.com>,
        cve-editorial-board-list <cve-editorial-board-list@...ts.mitre.org>
Subject: Re: RE: Concerns about CVE coverage shrinking - direct
 impact to researchers/companies

On 03/ 4/16 04:07 PM, Tim wrote:
> * No moderation required.  Let the public decide if they believe the
>    researcher or vendor.  If a moderator does bother to look over the
>    content, they could deduplicate/link issues together and address any
>    confusion, but beyond that, it isn't their job to decide what is a
>    vulnerability and what isn't.

If the site displays *any* user-submitted text, you need at least enough
moderation to filter out spammers & trolls.

-- 
	-Alan Coopersmith-              alan.coopersmith@...cle.com
	  X.Org Security Response Team - xorg-security@...ts.x.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.