Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's not about following the law with suspect motives. It's about the fact that following the technical protocol does not give you much defense against unlawful access charges.



That's absolutely correct.

I was responding to the naked phrase "technically allowed," which in hindsight is ambiguous (ie, "allowed under the law via a technicality," or "technologically feasible").

Rereading, I still think I interpreted correctly the first time, but really can't be sure.

Good catch.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: