On Sun, Nov 14, 2010 at 10:51 AM, Jan Wildeboer <jwildebo@xxxxxxxxxx> wrote: > be excluded under this new doctrine. Think of nmap, wireshark etc. Tools > that have a perfect use for debugging but can also be used for not-so-good > things. Here's the thing here. Nmap and wireshark do not *actively* exploit systems, nor hold themselves out as tools for doing so. Note that the language gives the Board the discretion, not the requirement, to deny inclusion of packages, so an analysis of all existing packages in the repository is not only not required, it's quite impractical. -Jon, speaking for himself -- marketing mailing list marketing@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/marketing