{"id":54,"date":"2006-05-17T12:46:37","date_gmt":"2006-05-17T16:46:37","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2006\/05\/17\/blue-frog-drops-out-of-war\/"},"modified":"2006-05-27T05:57:53","modified_gmt":"2006-05-27T09:57:53","slug":"blue-frog-drops-out-of-war","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2006\/05\/17\/blue-frog-drops-out-of-war\/","title":{"rendered":"Blue Frog drops out of war"},"content":{"rendered":"<p><a href=\"http:\/\/securitypronews.com\/insiderreports\/insider\/spn-49-20060503BlueFrogSpamWarEscalates.html\">Blue Frog<\/a> dropped out of the <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/05\/16\/AR2006051601873.html\"> war against spammers <\/a> citing that &#8220;It&#8217;s clear to us that [quitting] would be the only thing to prevent a full-scale <a href=\"http:\/\/www.stupidsecurity.com\/article.pl?sid=03\/10\/15\/0415200&amp;mode=thread\">cyber-war <\/a>that we just don&#8217;t have the authority to start,&#8221; Reshef said. &#8220;Our users never signed up for this kind of thing.&#8221;  The article also states that <a href=\"http:\/\/www.vnunet.com\/vnunet\/news\/2156778\/black-frog-takes-blue-frog\">&#8220;tens of thousands of hijacked computers [were used to flood] Blue Security&#8221;<\/a>.  I would bet that all ten thousand ran Windows which were installed from pirated copies.  Remember when Microsoft decided to drop support of updates to those &#8220;pirates&#8221;?  Thanks for the spam MS.  Seriously.<\/p>\n<p><!-- Now back to cramming the modern history of Japan into memory. \/\/--><br \/>\nUPDATE: 20060527 <a href=\"http:\/\/www.linuxsecurity.com\/content\/view\/122872\/65\/\">Black Frog<\/a> is rising up in Blues place.  Source code donated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blue Frog dropped out of the war against spammers citing that &#8220;It&#8217;s clear to us that [quitting] would be the only thing to prevent a full-scale cyber-war that we just don&#8217;t have the authority to start,&#8221; Reshef said. &#8220;Our users never signed up for this kind of thing.&#8221; The article also states that &#8220;tens of [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-54","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/54\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}