{"id":478,"date":"2003-11-19T00:00:00","date_gmt":"2003-11-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/19\/security-expert-proposes-hackers-union\/"},"modified":"2021-12-30T11:37:26","modified_gmt":"2021-12-30T11:37:26","slug":"security-expert-proposes-hackers-union","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/19\/security-expert-proposes-hackers-union\/","title":{"rendered":"Security expert proposes hackers&#8217; union"},"content":{"rendered":"<p>A proposal to create an association to represent the interests of hackers and vulnerability researchers is gaining support, a security expert said Wednesday.  The group, which would be geared toward researchers and not software vendors, would provide guidelines on vulnerability disclosures and would lobby against legislation that could stifle security researchers&#8217; ability to tinker with software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The move, first publicly proposed on Tuesday to a security mailing list, is the latest by hackers and security researchers to fight off corporate public relations and government policies that aim to suppress information about vulnerabilities from the public.<\/p>\n<p>Any group that represents the interests of vulnerability researchers could counter the Organization for Internet Safety&#8211;a group founded by Microsoft and several security firms that perform work for the software giant&#8211;which has proposed guidelines for the responsible disclosure of flaws.<\/p>\n<p>The new group would help security experts contact software makers, make sure they are credited for their work, lobby against legislation that blocks research, and in some cases, act as a proxy between researchers and companies.<\/p>\n<p>More info: [url=http:\/\/zdnet.com.com\/2100-1105_2-5109642.html]http:\/\/zdnet.com.com\/2100-1105_2-5109642.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-478","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=478"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/478\/revisions"}],"predecessor-version":[{"id":2965,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/478\/revisions\/2965"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}