• jagged_circle@feddit.nl
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    6
    ·
    edit-2
    4 days ago

    Nah, hacking legally requires you to gain access to a system that you’re not authorized to touch.

    Using a public API endpoint is not hacking.

    • Jerkface (any/all)@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      4 days ago

      Hacking is not the name of a charge or a crime. Hacking predates computers. This was clearly a hack. Don’t know what to tell you except go back to your sources.

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        4
        ·
        4 days ago

        The crime is “unauthorized access”

        In this case, this is not a crime because there is not authentication bypass. Its just accessing a public api

        • Madison420@lemmy.world
          link
          fedilink
          arrow-up
          5
          arrow-down
          1
          ·
          4 days ago

          It is unauthorized. An unlocked door isn’t an invitation not is an open website or database, this is clearly delineated in the cfaa which btw makes tampering with any protected device a crime open door or not.

          You should really lookup the law before you offer bad advice.

        • Jerkface (any/all)@lemmy.ca
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          edit-2
          4 days ago

          That has nothing to do with my point: “hacking” includes actions which are not illegal, or even malicious.

    • Madison420@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      4 days ago

      If you know it’s not intended to be open then you notify someone it’s white hat hacking.

      Iirc they actually modified it which removes any doubt.

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        4
        ·
        4 days ago

        Its a public API. This is not hacking any more than me using curl to read your comment without authenticating is hacking.

        • Madison420@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          4 days ago

          You can unlawfully use things that are public the fact they admit they know the opening is unintended makes it clearly hacking. Stop trying to undermine an accomplishment simply because you don’t like the connotations you link together in your head.

            • Madison420@lemmy.world
              link
              fedilink
              arrow-up
              3
              arrow-down
              1
              ·
              4 days ago

              You’re not though.

              Federal law specifically and in multiple prohibits unlicensed/unwanted entry into government devices, you don’t know what you’re talking about you simply feel it shouldn’t be illegal which is a different thing entirely.

    • Madison420@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      3
      ·
      4 days ago

      The cfaa:

      Section 1030 describes a number of offenses that occur when a defendant accesses a protected computer “without authorization.”  See 18 U.S.C. §§ 1030(a)(1), (a)(2), (a)(3), (a)(4), and (a)(5)(B)-©.  The Department will not charge defendants for accessing “without authorization” under these paragraphs unless when, at the time of the defendant’s conduct, (1) the defendant was not authorized to access the protected computer under any circumstances by any person or entity with the authority to grant such authorization; (2) the defendant knew of the facts that made the defendant’s access without authorization; and (3) prosecution would serve the Department’s goals for CFAA enforcement, as described below in B.3.

      https://www.justice.gov/jm/jm-9-48000-computer-fraud

      (2) the term “protected computer” means a computer— (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; (B) which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States; or © that— (i) is part of a voting system; and (ii) (I) is used for the management, support, or administration of a Federal election; or (II) has moved in or otherwise affects interstate or foreign commerce;

      https://www.law.cornell.edu/definitions/uscode.php?width=840&height=800&iframe=true&def_id=18-USC-695191731-692694672&term_occur=13&term_src=

      It is by definition hacking, stop being obtuse and moreover stop spreading misinformation.

      • piggy@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        4
        ·
        edit-2
        3 days ago

        The CFAA describes “hacking” (not a legal term) as any unauthorized access to a computer system. It literally means that your boss can pretend that you shouldn’t have accessed a file and fire you for it. It means “hacking” is effectively anything. Any incompetence no matter how stupid can result in you being a “hacker” under this law. You looked at a web page that a company claims you shouldn’t have even if they put it on their front page at the root of their domain? Yeah that’s hacking under the CFAA. Sucks to be you, maybe don’t go to wellsfargo.com when they’re doing “scheduled maintenance” you “hacker”. This legislation is trash.

          • piggy@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            3 days ago

            Lmao yea right

            https://en.wikipedia.org/wiki/Aaron_Swartz#United_States_v._Aaron_Swartz_case

            It took 40 years and countless trials and affected people for the state to come out and say that CFAA cannot be used against people accessing data that is normally available regardless of intent and purpose.

            https://www.bracheichler.com/insights/update-on-authorized-access-under-the-computer-fraud-and-abuse-act/

            It’s quite literally a Kafaka-esque law that makes no sense in the modern world because it’s overly broad working, interpretation and previous litigious use.

            https://jlsp.law.columbia.edu/2019/03/30/is-my-toaster-a-computer-the-computer-fraud-and-abuse-acts-definition-of-protected-computer-in-the-age-of-the-internet-of-things/

            It’s actually quite simple to get someone under the CFAA, and the burden isn’t high at all. It’s also quite nonsensical

            United States vs. Tyler King for example the prosecution and court found no financial motive, no direct involvement and he still got 6.5 years under the conspiracy provisions.

            Also some literal exploits are not officially “hacking”. That’s right some actual “hacking” is not hacking by law.

            https://en.wikipedia.org/wiki/United_States_v._Kane

            United States v Sergey Aleynikov, was literally the US DOJ prosecuting a case of intellectual property fraud on behalf of Goldman Sachs.

            CISCO has used the act and DOJ to silence critics and opposition as in United States v. Peter Alfred-Adekeye

            In United States v. Nosal & United States v. Lori Drew, the US had tried to get violations of TOS to be seen as a CFAA violation.

            CFAA was amended in 2008 to be even more broad than it was written originally.

            Looking at the civil cases it’s even more fun:

            Craigslist v. 3Taps says that an IP block is legally binding and getting around it is a violation of the CFAA.

            Pulte Homes, Inc. v. Laborers’ International Union creates a liability for any letter writing campaign that affects the ability of a company to do business. So if you have a campaign and too many people to complain to a web form such that it causes outages or degredation, it’s a violation and you’re liable.

            International Airport Centers, L.L.C. v. Citrin says that it’s a violation to delete files on your work computer, but also LVRC Holdings v. Brekka says using company computers for personal purposes is fine and also Lee v. PMSI, Inc. says violating company policy acceptable use policy is not a violation of the CFAA.

            CFAA is a joke anyone defending it has no idea what they’re talking about. There is not a serious technologist who looks at legal issues that consider this a good law. It has a history rife with abuse and corporate malfeasance.

            • Madison420@lemmy.world
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              edit-2
              3 days ago

              Right off the bat you lost.

              Swartz doesn’t have an outcome, he killed himself before that and this wouldn’t be normally accessible anyway. But bey nice ai try bud.

              Link#2 also a fail on your part.

              The Court held that an individual will “exceed authorized access” under the CFAA when he or she accesses a computer without authorization and obtains information located in particular areas of the computer, such as files or databases, that are off-limits to him. Because Van Buren had access to the license plate information he accessed, the Court reversed the Eleventh Circuit’s opinion. Thus, employers should carefully review employees’ computer access, as access for improper purpose may be permitted under the CFAA.

              Link#3

              The third is a critique of it’s incredible scope and vagueries of definitions which would again imply I’m correct.

              Seriously bud, AI is not your friend, don’t let it out do your schoolwork for you.

              • piggy@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                3 days ago

                Link#2 also a fail on your part.

                The Court held that an individual will “exceed authorized access” under the CFAA when he or she accesses a computer without authorization and obtains information located in particular areas of the computer, such as files or databases, that are off-limits to him. Because Van Buren had access to the license plate information he accessed, the Court reversed the Eleventh Circuit’s opinion. Thus, employers should carefully review employees’ computer access, as access for improper purpose may be permitted under the CFAA.

                I’m not going to reply anymore because you’re just doing debate bro shit without actually understanding what is happening and what has happened with the CFAA. The outcome of Van Buren forced the DOJ to issue explicit guidance which backtracked on previous things they would prosecute.

                https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security

                • Madison420@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  2 days ago

                  And you’re not reading your sources, none of those are about access to .gov sites and yet again critique is scope and vagueries.

                  because you’re just doing debate bro shit

                  Like actually reading or basing my argument on factual law not multiple unresolved opinion. Fuck would you need that for huh?