• my_hat_stinks@programming.dev
    link
    fedilink
    arrow-up
    3
    arrow-down
    2
    ·
    4 months ago

    Accessing a system you’re not authorised to access, regardless of how that access was obtained, is generally not legal. The way to sort that out is, you guessed it, a trial.

    • GBU_28@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      edit-2
      4 months ago

      When someone opens a connection on your network you are not obligated to avoid utility of those connected systems. It is not a crime to connect to things which have willfully joined your network.

      If someone puts a camera on your network, you can view it. Authorization is moot when it’s in your house.

      Edit I agree if you seek out someone else’s network and connect to and operate devices there.

      Edit edit put simply they forfeit any expectations of privacy when they open a connection to his network

      • my_hat_stinks@programming.dev
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        4 months ago

        This is very untrue and you definitely shouldn’t be giving out legal advice like this on topics you’re not knowledgeable on, but exactly which part is a crime and how criminal it is will depend on your local laws. Some such computer misuse laws are intentionally written very broadly with generic wording precisely so that edge cases such as unintentionally granting an unauthorised party access to a system does not clear them of wrongdoing when they do so.

        As for how to tell which laws are relevant and whether you’ve breached them? Well, I’m sure the answer will shock you.

        • GBU_28@lemm.ee
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          2
          ·
          edit-2
          4 months ago

          Nothing on lemmy is legal advice lmao.

          Further, they opened 2 way remote desktop connectivity. That is a literal invitation

          Edit now that that is covered, and completely distinct from all previous points and lines of discussion, it’s pretty shady to be looking for legal safe harbor for scammers who rob people all over the world every day.

          They are opening persistent 2 way connections to people’s machines with the clear goal of destroying them. There is little argument to suggest it is inappropriate to observe them while they do it.

          • my_hat_stinks@programming.dev
            link
            fedilink
            arrow-up
            2
            ·
            4 months ago

            it’s pretty shady to be looking for legal safe harbor for scammers who rob people all over the world every day.

            This is an argument that happened entirely within your own head, not in this thread. I think I made it clear right from the start I’m against scammers and approve of (ethical) actions taken against them, but I’m also against people who dox, invade privacy, engage in vigilantism, and gain unauthorised access to other’s computer systems (particularly when it’s for profit and ego). These are not mutually exclusive, there is no disconnect there. I even gave an example of more appropriate actions to take against scammers, notably actions that are actually effective.

            Criticism against “justice” porn is not remotely the same thing as condoning scammers. You’re arguing in bad faith and you know it.

            • GBU_28@lemm.ee
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              2
              ·
              4 months ago

              Observing criminals in action is not vigilantism. Discussing how that could be construed as illegal behavior is shady.