Welcome to Tesla Motors Club
Discuss Tesla's Model S, Model 3, Model X, Model Y, Cybertruck, Roadster and More.
Register
  • We just completed a significant update, but we still have some fixes and adjustments to make, so please bear with us for the time being. Cheers!

What are they Thinking.....

croman

Active Member
Nov 21, 2016
4,626
6,551
Chicago, IL
Definition for hack? There are probably a dozen. Typically courts will look at the plain meaning of a term unless it is defined. The Computer Fraud and Abuse Act has a rather complicated one: 18 U.S. Code § 1030 - Fraud and related activity in connection with computers. The DMCA has another that is circumventing a digital protection mechanism. 17 U.S. Code § 1201 - Circumvention of copyright protection systems

But I mean, there are so many different ways to hack something that it could trigger one or many laws.

The typical dictionary definition revolves around the use of computer code to solve a problem. So hack isn't always nefarious but I see it mostly used in a negative context with a negative connotation (i.e. to bypass security).
 
  • Informative
Reactions: arcus and lunitiks

croman

Active Member
Nov 21, 2016
4,626
6,551
Chicago, IL
They're not. But let's discuss the definition of 'hack' for a moment shall we? The first I'll ask if of course @croman

I will add that I agree that these particular lawmakers are morons who aren't thinking through the consequences of their legislation. Its unfortunately typical and its why people disregard laws in the US (because they don't make sense!). The DMCA is but one example (I mean, talk about a law blatantly ignored by a majority of those <35yo). Speed limits, stop signs, marijuana prohibition. It goes on and on.

I'm not entirely sure why someone can privatize this kind of business (Blackwater of hacking). I'm not an international lawyer, so I know very little, but I don't know of a law that prohibits this kind of interstate activity yet.
 

EchoDelta

Supporting Member
Mar 5, 2012
1,103
485
Seattle, Planet Earth
I recommend viewing “the internet’s own boy” - I knew Aaron and his case was (in my mind) an example of retaliation gone awry- in this case even with / through the legal system.
If the article linked is right, it could be interpreted as you private corporations using systems to bypass security measures, paying providers for backdoors, and other activities that could go beyond/outside the legal system.
This is especially risky with private parties unilaterally determining targets, getting private information without subpoenas, and even risking planting evidence and creating scapegoats.
Can any of *you* actively prove your systems were not used to hack X, if X is determined enough to find *you* or *anyone* guilty of something?
 

About Us

Formed in 2006, Tesla Motors Club (TMC) was the first independent online Tesla community. Today it remains the largest and most dynamic community of Tesla enthusiasts. Learn more.

Do you value your experience at TMC? Consider becoming a Supporting Member of Tesla Motors Club. As a thank you for your contribution, you'll get nearly no ads in the Community and Groups sections. Additional perks are available depending on the level of contribution. Please visit the Account Upgrades page for more details.


SUPPORT TMC
Top