@ the_logos:
You obviously missed the part where I said the info was on a "need-to-know" basis, not "completely hidden from everyone" basis. If you're going to attack my points, at least make sure and read them in their entirety. Had you done that, you'd see why your examples don't apply. The chemicals those players used was already widely known before the hearings, hence there was no reason to hide it. Nobody benefits from knowing -how- to count cards because it's not something you can just learn and do; it's more of an inherent 'talent', so to speak.
@ Maelgrim:
The only people that benefit from having knowledge about a traffic exchange website exploit are the admin of the site, and people who want to use the exploit. Thus, common sense tells us that if we want to prevent the exploit from being used we should 1) give the source code to the admin, and 2) prevent potential abusers from getting the source code. Well, guess which one of these -wasn't- accomplished by publically releasing it.
@ The_Disciple:
Please refer to my comment on people like you who can't attack the post, and resort to attacking the poster. Get back to me when you decide to join civil society and participate in a discussion that doesn't involve "LOL UR STUPID. YOU LOST THE INTERNET DOOD HAHAHA".
Oh, and I'm sorry, but the general public having access to the source code of an exploit does not prevent further abuse in any conceivable way. Providing the admin of this site with said source code is the only way to -help- prevent further abuse (if the admin took steps to utilize this info). The only thing accomplished by spreading the knowledge to the public is increasing the chances that someone else will use it. And contrary to the beliefs of a few of you, making the source code known, even to the admin, does not prevent its use, -especially- if it's altered to be better.
For example, it would be quite easy to alter his program to run consistently in the background adding votes gradually over the course of a 24 hour period, rather than in short bursts. This wouldn't be detectable by graphing, and you can probably blame the_logos if it ever happens (not that you would know if it did, unless Adam decides to start logging/checking voter IPs - and even then you could still use a lengthy list of proxies to remain undetected).
[edit] As an aside, this is my last post on this thread, and I won't be reading any responses to it, so feel free to ignore it if you wish.
|