{"id":502,"date":"2003-10-12T14:26:36","date_gmt":"2003-10-12T18:26:36","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/metasj\/2003\/10\/12\/security-channels\/"},"modified":"2003-10-12T14:26:36","modified_gmt":"2003-10-12T18:26:36","slug":"security-channels","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/sj\/2003\/10\/12\/security-channels\/","title":{"rendered":"Security channels"},"content":{"rendered":"<p><a name='a272'><\/a><\/p>\n<p><P>Steve Ballmer, talking about computer researchers who publish vulnerabilities in Microsoft&#8217;s products [emphasis mine], after recent outbreaks of MS-security violations, and email-worms exploiting Outlook security holes:<\/P><br \/>\n<BLOCKQUOTE><br \/>\n<P><EM><FONT size=\"4\">&#8220;<A href=\"http:\/\/tinyurl.com\/qhzz\">I wish those [<STRONG>researchers<\/STRONG>] just would be <STRONG>quiet<\/STRONG>&#8230; It would be <STRONG>best<\/STRONG> for the <STRONG>world<\/STRONG>.<\/A>&#8220;<\/FONT><\/EM><\/P><\/BLOCKQUOTE><br \/>\n<P>&nbsp;<\/P><\/p>\n<p><a href='http:\/\/tinyurl.com\/qhzz'>Security channels &#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Steve Ballmer, talking about computer researchers who publish vulnerabilities in Microsoft&#8217;s products [emphasis mine], after recent outbreaks of MS-security violations, and email-worms exploiting Outlook security holes: &#8220;I wish those [researchers] just would be quiet&#8230; It would be best for the world.&#8220; &nbsp; Security channels &#8230;<\/p>\n","protected":false},"author":135,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[210],"tags":[],"class_list":["post-502","post","type-post","status-publish","format-standard","hentry","category-chain-gang"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7iVvB-86","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/posts\/502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/users\/135"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/comments?post=502"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/posts\/502\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/media?parent=502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/categories?post=502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/sj\/wp-json\/wp\/v2\/tags?post=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}