|
Authored by: kuroshima on Sunday, February 03 2013 @ 12:55 PM EST |
This message is encoded in rot26. If you are in the US, you
would be breaking the DMCA and the CFAA by reading it, except
I am not evil, and so authorize you to crack it.[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Sunday, February 03 2013 @ 06:03 PM EST |
I am the OP for this thread
I thought about going down the same path that you did, but the problem is
defining what an 'effective' security control is.
That's why I went with the much more basic items.
1. it should not be a crime to violate a ToS statment.
It's not a crime to violate a negotiated and signed contract, it's a civil
matter, why should violating a ToS statement (which can be changed at any time,
without notice in most cases) be a crime?
2. it should not be a crime to provide false or misleading information to a
site
the one exception to this is if you are providing information that you know
makes to seem to be someone else, this does not need to be covered in this law,
identity theft laws can take care of this.
providing fake DoB, pet's name, mother's maiden name, etc is a legitimate
thing to do because it prevents someone who breaks into one site (or an insider
at that site) from accessing other sites that ask for the same information
any e-mail address that you provide should be acceptable, as long as you
actually have access or control of that e-mail address. providing someone else's
e-mail address falls back under the identity theft category
3. using a different computer to access a site, or doing something that makes a
computer you have look like a different computer to a site should not be a
crime.
There are lots of legitimate reasons to switch from one computer to another,
or to run a VM and create a new one, etc. Having the law consider making the
computer look like another one a crime would be like making it a crime to grow a
beard because sometimes criminals grow a beard to disguise themselves. [ Reply to This | Parent | # ]
|
|
|
|
|