MSI confirms cyber attack, hackers claim to have stolen source code – Computer – News


in precept you’re partly proper, you aren’t allowed to make use of stolen code, however you’re additionally not allowed to reverse engineer licensed code, that’s to say you aren’t allowed to avoid measures which were taken to get to the content material.

Opposite to what many individuals assume, the primary stage in cleanroom rev-engineering is definitely simply hacking / cracking / stealing supply code and / or mental property.

however as soon as info is public, and so long as that info would not revolve round patented methods, you’ll be able to redevelop that code and ensure it is appropriate with gadget {hardware} and signaling. merely put, you need to adhere to precisely the identical guidelines as with clear room reverse engineering….

the ‘authorized’ exploit that such researchers use (abuse) is that sharing data can’t be a therapeutic. not even when that data comes from a stolen supply. so whether or not that ‘identified impact’ comes from information theft, from hacking, or from sheer luck, shouldn’t be totally related.

[Reactie gewijzigd door i-chat op 7 april 2023 13:27]