Most active commenters
  • traceroute66(5)
  • CaptainOfCoit(3)

←back to thread

137 points samray | 22 comments | | HN request time: 0.434s | source | bottom
1. traceroute66 ◴[] No.45537711[source]
> We affirm our strict adherence to all relevant regulations and service terms throughout this project.

Except if you bypassed payment and used the service in a manner that was not intended, most likely you were by definition not undertaking "strict adherance" to service terms ?

replies(2): >>45537995 #>>45537996 #
2. VladVladikoff ◴[] No.45537995[source]
Yeah I am a bit confused about posts like this. It’s bragging about breaking the law. There was a particularly bad one a few months ago where a kid had hacked Monster’s employee training site, and was sharing all this internal media in the post. I don’t understand how they don’t end up getting in some seriously annoying trouble with law enforcement. Well I looked it up just now and the post was deleted, I guess maybe he did get in trouble. https://news.ycombinator.com/item?id=44997145
replies(5): >>45538023 #>>45538161 #>>45538184 #>>45538754 #>>45541169 #
3. CaptainOfCoit ◴[] No.45537996[source]
Say you're on a plane from Canada to Hong Kong (random example), which country's laws would be applicable here? The country where the airplane is registered?
replies(3): >>45538065 #>>45538482 #>>45538558 #
4. CaptainOfCoit ◴[] No.45538023[source]
Could also just be lack of knowledge. Weren't we all a bit more risky and playful with other people's websites when we were kids and the internet was still accessed via modems? Remember talking about that with both other kids and adults without getting in trouble, but it was also decades ago. Once I saw others getting in real big trouble (like prison), then I kind of tried to find more beneficial ways of learning programming and computers.
replies(2): >>45538117 #>>45538764 #
5. traceroute66 ◴[] No.45538065[source]
> which country's laws would be applicable here? The country where the airplane is registered?

For all intents and purposes it is the country of registration of the aircraft.

There are one or two exceptions to the rule, but they would not be applicable in this scenario. Mostly stuff relating to air safety. For example, if the aircraft did something against the aviaition laws of the country being overflown. Or hijackings etc.

6. traceroute66 ◴[] No.45538117{3}[source]
> Could also just be lack of knowledge.

Huh ?

DNS tunneling is not exaclty something you do "by accident".

And if the person doing it on the flight "did not know" (which, given the text of the blog, I doubt) , then you can bet your botom dollar that the "roommate" that was summoned for remote assistance knew very well what was going on.

replies(1): >>45538138 #
7. CaptainOfCoit ◴[] No.45538138{4}[source]
Didn't claim so either, but a lack of knowledge about that it is in fact illegal, hence the parallel to at least my previous experience where I've most surely have committed crimes in the past, because I didn't know it was illegal in the first place.

I don't know the age of the author, but it almost doesn't matter, sometimes people don't know (lack of knowledge).

8. eps ◴[] No.45538161[source]
> breaking the law

Not law per se. More like contractual obligations taken upon by connecting to the flight's WiFi.

replies(4): >>45538281 #>>45539324 #>>45539753 #>>45542237 #
9. jxf ◴[] No.45538184[source]
IMO a certain amount of youthful indiscretion that takes the form of challenging systems and structures feels like it's both tolerable and important. Agitation prevents calcification.
10. traceroute66 ◴[] No.45538281{3}[source]
> Not law per se. More like contractual obligations taken upon by connecting to the flight's WiFi.

Well, being pedantic, you could be said to be breaking Civil Law. :)

Jest aside, IANAL but most western countries have some sort of Criminal Law relating to mis-use of computers.

A brief search for Canada reveals Criminal Code (R.S.C., 1985, c. C-46)[1].

Again IANAL, but from my reading in this scenario it would be (c) -> (a), "uses or causes to be used ... a computer system" to "obtains, directly or indirectly, any computer service".

[1]https://laws-lois.justice.gc.ca/eng/acts/C-46/section-342.1....

replies(1): >>45539723 #
11. Traubenfuchs ◴[] No.45538482[source]
Same country that would be responsible if you stab your seat neighbor for taking too much space I‘d guess.
replies(1): >>45538692 #
12. jan_Sate ◴[] No.45538558[source]
It depends on which jurisdiction region wants to enforce the law. If someone wants to enforce a law, and it succeed, then the law of that jurisdiction region applies.
13. traceroute66 ◴[] No.45538692{3}[source]
> if you stab your seat neighbor for taking too much space

IIRC the way it works is that when you land (destination or forced landing elsewhere) the offender is delivered to the local competent authorities.

They then undertake an initial investigation and decide either to exercise their own jurisdiction or undertake extradition proceedings to send the offender to the country of registration of the aircraft.

In a scenario of (attempted)murder, I suspect that it is highly likely it would be dealt with in the local courts unless there was a specific external push for extradition.

The point of the convention is to ensure there is never no jurisdiction, i.e. the country of registration to the aircraft is always there as the ultimate fallback. The wording doesn't seek to strictly define the jurisdiction, which is why in most cases the delivery country has the option to take jurisdiction.

14. ohyoutravel ◴[] No.45538754[source]
I didn’t see this, but the monster hacker blog post is up on archive. Honestly the person sounds like a kid:

https://web.archive.org/web/20250823174801/https://bobdahack...

15. gus_massa ◴[] No.45538764{3}[source]
> Remember talking about that with both other kids and adults without getting in trouble.

A few kids doesnt matter. A few adults is only a problem if it's their stuff (If they are teachers, they will care more about unautorized changes of the wallpaper in the computer of the school that anything in a remote computer.) And yuo can even later claim they misunderstood or you were exagerating.

But here is an in written report in front of thousands of persons and about planes that is a sensitive topic.

16. gruez ◴[] No.45539324{3}[source]
Isn't this pretty straightforwardly "theft of service", like "stealing" cable TV service?
17. ◴[] No.45539723{4}[source]
18. Aurornis ◴[] No.45539753{3}[source]
Most countries will have laws covering cases of unauthorized access, theft of services, and computer misuse.

The user agreement helps define the service as a paid service with defined access cases. Going around those would put the user in violation of some laws.

An analogy would be showing up to a paid event venue and noticing a back door was left open. Going into the building without paying is not okay, even though you never engaged with the ticket office to agree to anything.

replies(1): >>45539911 #
19. ballenf ◴[] No.45539911{4}[source]
If the user routed all traffic through a WeChat or other messaging service, they would just be using messaging.
replies(1): >>45541086 #
20. nradov ◴[] No.45541086{5}[source]
Intent matters. In US legal jurisdictions that could potentially be prosecuted as a CFAA violation, although I'm not aware of any cases like that yet.

https://www.justice.gov/jm/jm-9-48000-computer-fraud

21. pavel_lishin ◴[] No.45541169[source]
I was about to correct you and say that bobdahacker hacked McDonald's, but I guess he did both, and bragged about both.
22. hluska ◴[] No.45542237{3}[source]
This is theft. Stealing is illegal. Giving a blueprint for how you stole is the icing on the prosecutorial cake because you can’t claim lack of knowledge if you create a conspiracy to enable the theft.

This may be the dumbest write up I have ever read.