Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Open question to computer security law experts:
- What does U.S. law say about defensive hacking? For example, if someone keeps trying to hack into a website that I'm in charge of securing using an outdated web browser, what does the law say about hypothetically exploiting their browser to send their true non-proxy-protected IP address to another location? (For example: send a bunch of HTTP requests to ic3.gov /?I-attempted-to-hack-domain.com-on-(timestamp) without going through SOCKS or HTTP proxies).
- The reason I've thought of this is as follows:
- 1. If the malicious hackers' IP address and time are exposed, they will get arrested.
- 2. If they're using a remote desktop or similar service through a hacked computer to perform their attacks, then the person they infected can be traced back and have their computer fixed (or taken offline) to prevent further damage.
- 3. In either of the above cases, there will be less annoying script-kiddie cybercrime.
- I'm interested in hearing what the law says and allows about this.
Advertisement
Add Comment
Please, Sign In to add comment