It's very simple, and something like this is done all the time in the security industry by people who not only enjoy it, but who get paid to do it.
1) Discover an exploit or a new way of using a known exploit.
2) Write a trojan, virus, worm, etc. that takes advantage of the exploit.
3)* Report the exploit to the applicable compan(y/ies), Security Focus, etc. and provide the BINARY of your trojan, virus, or whatever so they can test the
exploit and find a fix.
* Usually people provide the source code as open software. In this case (for this argument) we release it as binary only and keep full rights.
No law was broken when the trojan, virus, etc. was written and no one can (technically) seek prosecution. Under DMCA (at least the way the writers of it have
used it), anyone attempting to reverse engineer your virus (or whatever) and provide an antigen, is liable to you and you can sue them.
To take another angle, those of us who actively look for exploits in software (because companies like M$ fail to do so themselves) risk being sued for doing so.
This makes jobs like mine EXTREMELY difficult because on the one hand I don't want my company using software that will allow Joe Cracker to take over our
machines, and on the other I don't want the company sued just because I did some necessary reverse engineering in order to prevent it (again, because the
software mfg. can't be trusted to do it themselves).
PGA
-- Paul G. Allen UNIX Admin II/Programmer Akamai Technologies, Inc. www.akamai.com Work: (858)909-3630 Cell: (858)395-5043 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/