With the two-month comment period for the proposed U.S. Wassenaar Arrangement rules barely under way, a cast of influential security researchers has wasted no time preparing and submitting their thoughts on the controversial proposal.

Researchers who seek out vulnerabilities in software

The link for this article located at ThreatPost is no longer available.