←back to thread

137 points samray | 8 comments | | HN request time: 0.228s | source | bottom
Show context
traceroute66 ◴[] No.45537711[source]
> We affirm our strict adherence to all relevant regulations and service terms throughout this project.

Except if you bypassed payment and used the service in a manner that was not intended, most likely you were by definition not undertaking "strict adherance" to service terms ?

replies(2): >>45537995 #>>45537996 #
VladVladikoff ◴[] No.45537995[source]
Yeah I am a bit confused about posts like this. It’s bragging about breaking the law. There was a particularly bad one a few months ago where a kid had hacked Monster’s employee training site, and was sharing all this internal media in the post. I don’t understand how they don’t end up getting in some seriously annoying trouble with law enforcement. Well I looked it up just now and the post was deleted, I guess maybe he did get in trouble. https://news.ycombinator.com/item?id=44997145
replies(5): >>45538023 #>>45538161 #>>45538184 #>>45538754 #>>45541169 #
1. eps ◴[] No.45538161[source]
> breaking the law

Not law per se. More like contractual obligations taken upon by connecting to the flight's WiFi.

replies(4): >>45538281 #>>45539324 #>>45539753 #>>45542237 #
2. traceroute66 ◴[] No.45538281[source]
> Not law per se. More like contractual obligations taken upon by connecting to the flight's WiFi.

Well, being pedantic, you could be said to be breaking Civil Law. :)

Jest aside, IANAL but most western countries have some sort of Criminal Law relating to mis-use of computers.

A brief search for Canada reveals Criminal Code (R.S.C., 1985, c. C-46)[1].

Again IANAL, but from my reading in this scenario it would be (c) -> (a), "uses or causes to be used ... a computer system" to "obtains, directly or indirectly, any computer service".

[1]https://laws-lois.justice.gc.ca/eng/acts/C-46/section-342.1....

replies(1): >>45539723 #
3. gruez ◴[] No.45539324[source]
Isn't this pretty straightforwardly "theft of service", like "stealing" cable TV service?
4. ◴[] No.45539723[source]
5. Aurornis ◴[] No.45539753[source]
Most countries will have laws covering cases of unauthorized access, theft of services, and computer misuse.

The user agreement helps define the service as a paid service with defined access cases. Going around those would put the user in violation of some laws.

An analogy would be showing up to a paid event venue and noticing a back door was left open. Going into the building without paying is not okay, even though you never engaged with the ticket office to agree to anything.

replies(1): >>45539911 #
6. ballenf ◴[] No.45539911[source]
If the user routed all traffic through a WeChat or other messaging service, they would just be using messaging.
replies(1): >>45541086 #
7. nradov ◴[] No.45541086{3}[source]
Intent matters. In US legal jurisdictions that could potentially be prosecuted as a CFAA violation, although I'm not aware of any cases like that yet.

https://www.justice.gov/jm/jm-9-48000-computer-fraud

8. hluska ◴[] No.45542237[source]
This is theft. Stealing is illegal. Giving a blueprint for how you stole is the icing on the prosecutorial cake because you can’t claim lack of knowledge if you create a conspiracy to enable the theft.

This may be the dumbest write up I have ever read.