TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Legal considerations when gathering threat intellegence from illict sources [pdf]

90 pointsby scalableUniconabout 5 years ago

3 comments

tptacekabout 5 years ago
To me, the big question underneath all of this is password dumps. I don't know that there was much uncertainty about buying vulnerabilities. But password dumps are almost always per se stolen data, and it's a bit of an open secret that there are anti-ATO teams using those dumps to create better versions of HIBP. I read this looking for clear guidance on whether it was safe to buy a password dump if you're only using it to force password resets for your users, and didn't come away with much certainty in either direction.
评论 #22539215 未加载
评论 #22542898 未加载
meowfaceabout 5 years ago
I&#x27;m glad they released this and made it clear that there is a legal and safe way to collect this sort of information.<p>From my reading, as long as you&#x27;re not furthering any crimes the community is engaged in, or impersonating a real person to gain their trust (as opposed to a fictional false identity), or breaching any systems they use, then it&#x27;s generally okay to gather information. Purchasing stolen data (that you own&#x2F;are authorized to possess) and vulnerabilities is more complicated, but they explain some legal ways of doing it.
评论 #22538661 未加载
JadeNBabout 5 years ago
&#x27;Intellegence&#x27; in the title should be &#x27;intelligence&#x27;, as in the linked document.