Is This Even Legal?
#39
by infocecas - opened
As I understand it, this model could potentially be used to find vulnerabilities in software security and similar things. If I’m misunderstanding something, could someone please explain how this works? I would be very grateful.
There's no law against finding vulnerabilities in software, researching system vulnerabilities, or other such information security work. People do it for a living.