392
Rule (lemmy.blahaj.zone)
you are viewing a single comment's thread
view the rest of the comments
[-] stevedidwhat_infosec@infosec.pub 8 points 5 months ago

Allow me to introduce the often abused Computer Fraud and Misuse act: https://en.m.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

If you’d like to lose the ability to use ANY sort of technology for decades if not indefinitely, go ahead with the greyhat stuff.

The sector of lawfully using your knowledge for good is ever expanding and pays well. I’d strongly advise using your powers for good and dodge any unnecessary risk if you enjoy doing what you do.

9/10 times, it ain’t worth the risk. Being strategic and thinking things over carefully (err on the side of least action) is going to benefit you

[-] sandalbucket@lemmy.world 15 points 5 months ago

My apologies, allow me to elaborate - grayhatwarfare.com is a cybersecurity company that crawls and indexes publicly-available blob stores, like s3 buckets, azure storage accounts, digital ocean spaces, and google cloud object stores. They offer limited search capabilities for free, no account-wall.

They are a legitimate cybersecurity company, despite their name.

My employer is working on a sensitive data scanning service, to alert clients in case their information surfaces in these buckets (even if they do not own the bucket), leveraging the grayhatwarfare api. In short, allowing us to detect and remediate the problem, which I hope you will agree is a white-hat activity :)

I do not publicly condone breaking the law. I reserve the right to criticize the DMCA tho ;)

[-] stevedidwhat_infosec@infosec.pub 10 points 5 months ago

Good to know! Hadn’t heard of these peeps before, appreciate the clarification and new info!

this post was submitted on 06 Jun 2024
392 points (100.0% liked)

196

16459 readers
1743 users here now

Be sure to follow the rule before you head out.

Rule: You must post before you leave.

^other^ ^rules^

founded 1 year ago
MODERATORS