• 0 Posts
  • 137 Comments
Joined 2 years ago
cake
Cake day: July 2nd, 2023

help-circle






  • Right off the bat you lost.

    Swartz doesn’t have an outcome, he killed himself before that and this wouldn’t be normally accessible anyway. But bey nice ai try bud.

    Link#2 also a fail on your part.

    The Court held that an individual will “exceed authorized access” under the CFAA when he or she accesses a computer without authorization and obtains information located in particular areas of the computer, such as files or databases, that are off-limits to him. Because Van Buren had access to the license plate information he accessed, the Court reversed the Eleventh Circuit’s opinion. Thus, employers should carefully review employees’ computer access, as access for improper purpose may be permitted under the CFAA.

    Link#3

    The third is a critique of it’s incredible scope and vagueries of definitions which would again imply I’m correct.

    Seriously bud, AI is not your friend, don’t let it out do your schoolwork for you.




  • The cfaa:

    Section 1030 describes a number of offenses that occur when a defendant accesses a protected computer “without authorization.”  See 18 U.S.C. §§ 1030(a)(1), (a)(2), (a)(3), (a)(4), and (a)(5)(B)-©.  The Department will not charge defendants for accessing “without authorization” under these paragraphs unless when, at the time of the defendant’s conduct, (1) the defendant was not authorized to access the protected computer under any circumstances by any person or entity with the authority to grant such authorization; (2) the defendant knew of the facts that made the defendant’s access without authorization; and (3) prosecution would serve the Department’s goals for CFAA enforcement, as described below in B.3.

    https://www.justice.gov/jm/jm-9-48000-computer-fraud

    (2) the term “protected computer” means a computer— (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; (B) which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States; or © that— (i) is part of a voting system; and (ii) (I) is used for the management, support, or administration of a Federal election; or (II) has moved in or otherwise affects interstate or foreign commerce;

    https://www.law.cornell.edu/definitions/uscode.php?width=840&height=800&iframe=true&def_id=18-USC-695191731-692694672&term_occur=13&term_src=

    It is by definition hacking, stop being obtuse and moreover stop spreading misinformation.