TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

It’s Finally Legal to Hack Your Own Devices (Even Your Car)

154 pointsby _isusover 8 years ago

10 comments

wyldfireover 8 years ago
From [1] : &quot;(ii) For purposes of this exemption, “good-faith security research” means accessing a computer program solely for purposes of good-faith testing, investigation and&#x2F;or correction of a security flaw or vulnerability, where such activity is carried out in a controlled environment designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices or machines on which the computer program operates, or those who use such devices or machines, and is not used or maintained in a manner that facilitates copyright infringement.&quot;<p>So it seems like it&#x27;s all going to be gauged in how the material is presented&#x2F;hosted. The way I read it is &quot;disclose the details of the bug and source, ok. but once you start hosting an executable like &#x27;.&#x2F;rootmysystem&#x27; or &#x27;.&#x2F;disable_copy_prot&#x27; then you&#x27;re entering the grey area.&quot; (Or rather the decision would probably be made based on whether your website looks like one that encourages or promotes infringement versus one that promotes security.<p>[1] <a href="https:&#x2F;&#x2F;www.federalregister.gov&#x2F;documents&#x2F;2015&#x2F;10&#x2F;28&#x2F;2015-27212&#x2F;exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control#p-193" rel="nofollow">https:&#x2F;&#x2F;www.federalregister.gov&#x2F;documents&#x2F;2015&#x2F;10&#x2F;28&#x2F;2015-27...</a>
sctbover 8 years ago
Previous discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12826946" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12826946</a>
6stringmercover 8 years ago
Neat. I like the exemption in principle, and the &quot;Good Faith&quot; condition will probably be the lynch pin that gets tested in court cases if they come up. What is Good Faith in security research is not necessarily - I don&#x27;t think - a settled issue. Especially in light of the CFAA still on the books. I&#x27;d appreciate more and more clarity coming through (and augmentations to existing law to make them better) over time.<p>I wonder how the EFF will respond to this, because I recall one of their lawsuits (major?) is about DMCA exemption for security research (Plaintiff 1) but also violating DMCA in a for-profit-enterprise (Bunny).
sschuellerover 8 years ago
Can&#x27;t they still restrict you? For example Tesla could prevent you from connecting to their network and being able to use super chargers if you in any way &#x27;hack&#x27; your car.
评论 #12847986 未加载
Shivetyaover 8 years ago
so not much has truly changed, this is a simple limited time reprieve. based on wording can you give permission for another party to work on hardware you have? As in, can a manufacturer still declare that an end user cannot grant access to another under the idea that the other party does not own the device and as such is not legally allowed to work on it?
gr3yh47over 8 years ago
Legal minds of HN: would the Sony vs Hotz case have been thrown out if this provision was in place at the time?
评论 #12847057 未加载
评论 #12846830 未加载
评论 #12851668 未加载
rajangdavisover 8 years ago
Out of curiosity, can this apply to SaaS products at all? It seems like the provisions are relaxed in general.<p>I am curious if I could use this to reverse engineer a product that isn&#x27;t hardware AND does not have explicit provisions saying that I am not allowed to reverse engineer the software.
inlinedover 8 years ago
I wonder if this new freedom to do security research can help us discover vulnerabilities in our IoT devices before they&#x27;re used in another massive DDoS.
评论 #12853884 未加载
yifanluover 8 years ago
Can someone point me to the actual ruling? The only one I can find was from last year (2015). Has it even been ruled this year yet?
评论 #12847616 未加载
mgrennanover 8 years ago
Time to through down on the IOTs.
评论 #12847166 未加载