On Mon, 1 Sep 2014, Adam Borowski wrote:
Also, should we detect all other attempts to contact the outside network,
and swat such builds with extreme prejudice?
Yes. These can be privacy breeches, licence violations (download
things that change what gets embedded into the packages), and
all
On Tue, Sep 02, 2014 at 01:28:13PM +0200, Thorsten Glaser wrote:
On Mon, 1 Sep 2014, Adam Borowski wrote:
Also, should we detect all other attempts to contact the outside network,
and swat such builds with extreme prejudice?
Yes. These can be privacy breeches, licence violations
2 matches
Mail list logo