Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So is unauthorized access to a protected computer, yet a lot of that goes on at security conferences too.


I guess, according to your logic, anything goes then at these conferences?


Many of the people at those conferences aren't afraid to 'color outside the lines,' and impersonating an FBI agent could fall under the umbrella of social engineering, which is another hot topic at security conferences.

I would not view it as outside the realm of possibility.


I'm sorry, if I may ask, what is the use of the answer to your question?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: