|
Authored by: Anonymous on Wednesday, January 30 2013 @ 03:49 PM EST |
People have been convicted, in the UK, for executing 'directory traversal
attacks'. That mean British Telecom automatically logged their request for
a URL where they typed "/../" as part of the address. Note that the
investigation that lead to this started from the BT log, not a complaint from
the accessed site. Simply having publicly accessible pages is not seen as
a clear invite - it depends how you find and access the page as well.
The law does not need to make sense, it is not being drafted and enforced
by the technically literate, as we have witnessed again all too recently.[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Thursday, January 31 2013 @ 12:34 AM EST |
1) Any data you get from a computer on the internet is
"authorised"
for you to look at, otherwise why is that remote machine telling
you it? Server
Admin is who should get in trouble, not client user. Not current
law
Not unless you do not have proper authority to access that
machine and have cracked into that machine to get it to send data to you:
committing identity fraud upon the remote machine.
Considering the penalties
for some things, the Admins should get into trouble: depending upon the
machine and set up if it was easy for a cracker to get into the machine
(when it should not have been), then the Admin has clearly aided and abetted
them - they (or anyone who made it easy for the cracker) should have a
punishment of a minimum of at least half, if not the same as, the
cracker.
Thinking back, those ebooks which were encrypted by ROT13, clearly
using such a weak encryption should have made the publishers guilty of aiding
and abetting those who cracked that encryption. But that's the DMCA (bought by
...) for you. [ Reply to This | Parent | # ]
|
|
|
|
|