Artificially Intelligent Unstructured thoughts on cyber security, cyber warfare, information warfare, resilience, and all things risk management.

Wassenaar Arrangement and dual-use computer code

The Wassenaar Arrangement is frequently mentioned in information security (and vulnerability research in particular) since inclusion of computer code as dual-use good. The Agreement does not clearly specify what is... »