Is This Even Legal?

#39
by infocecas - opened

As I understand it, this model could potentially be used to find vulnerabilities in software security and similar things. If I’m misunderstanding something, could someone please explain how this works? I would be very grateful.

There's no law against finding vulnerabilities in software, researching system vulnerabilities, or other such information security work. People do it for a living.

Sign up or log in to comment