We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hacking Law is for Hackers

00:00

Formal Metadata

Title
Hacking Law is for Hackers
Title of Series
Number of Parts
85
Author
Contributors
N. N.
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
What a year for hacker law! 2021-2022 saw major changes to laws that regulate hacking, such as the notorious CFAA, the grotesque DMCA Sec. 1201, and China's grisly "Management of Security Vulnerabilities" regulation. This presentation will walk through each of these developments and etail their implications for security researchers. We'll give background on how these laws have recently changed, identify areas of continued risk for hackers, and suggest concrete ways for the security community to make additional progress in shaping a favorable legal environment. An extended roundtable discussion will follow the presentation.
AreaPhysical lawMathematicsAcoustic shadowGroup actionOnline helpDisk read-and-write headStreaming mediaBitDivision (mathematics)Descriptive statisticsMetropolitan area networkRule of inferenceHacker (term)Row (database)Multiplication signMusical ensembleInformation securityCybersexComputer animationLecture/Conference
Hacker (term)State of matterComputerLinker (computing)Group actionSoftware bugAnnihilator (ring theory)Service (economics)Goodness of fitNeuroinformatikPower (physics)Thermal conductivityProfil (magazine)Physical lawPresentation of a groupElectronic mailing listMathematicsTerm (mathematics)Civil engineeringAuthorizationInternetworkingCodeSubsetInformation securityExpert systemBitHacker (term)Latent heatProjective planeException handlingGame controllerMultiplication signInternet der DingeCASE <Informatik>Perspective (visual)DigitizingQuicksortLevel (video gaming)Office suiteElectronic visual displayDatabaseMereologyGraph coloringState of matterInterpreter (computing)Logic gateSinc functionDecision theoryRight angleArithmetic meanStatuteFacebookAnalogyCodeVideo projectorMalwarePasswordServer (computing)Denial-of-service attackVulnerability (computing)Film editingInteractive televisionCoordinate systemMorley's categoricity theoremLaptopPatch (Unix)Computer animation
Linker (computing)ComputerHacker (term)InternetworkingAuthorizationHill differential equationIRIS-TMathematicsConvex hullSheaf (mathematics)Software testingInformation securityVulnerability (computing)InformationService (economics)Dew pointCASE <Informatik>MultilaterationContent (media)NumberNeuroinformatikFormal languageSoftware testingBitTheoryBlock (periodic table)Limit (category theory)MereologyOrder (biology)CybersexDigital electronicsDependent and independent variablesType theoryWordOffice suiteMusical ensembleQuicksortAnnihilator (ring theory)Logic gateAuthorizationInternetworkingRight angleHacker (term)Direction (geometry)Information securityInformationMathematicsComputer fileAddress spacePhysical lawVulnerability (computing)State of matterAssociative propertySeries (mathematics)Heegaard splittingService (economics)Multiplication signEmailThresholding (image processing)Interpreter (computing)Decision theoryPhysical systemStatuteOnline service providerOnline helpGoodness of fitPhysicalismSocial classDirectory serviceComputer animation
ComputerSheaf (mathematics)MathematicsCivil engineeringInformation securityAuthorizationMinimal surfaceSoftwareHacker (term)Software testingVulnerability (computing)InformationCopyright infringementIntegrated development environmentConvex hullFormal languageException handlingMereologyQuicksortAnnihilator (ring theory)Goodness of fitDifferent (Kate Ryan album)BitPoint (geometry)Film editingControl flowLevel (video gaming)Suite (music)Limit (category theory)Form (programming)StatuteMomentumCircleType theoryCASE <Informatik>Internet der DingeMeasurementMultiplication signNeuroinformatikDigitizingSheaf (mathematics)Physical systemSoftware testingArithmetic meanOffice suitePosition operatorSoftwareAuthorizationComputer programmingCopyright infringementInformation securityVulnerability (computing)InformationMedical imagingMinimal surfacePhysical lawTerm (mathematics)Hacker (term)Integrated development environmentCivil engineeringEncryptionData conversionProcess (computing)Standard deviationParsingDesign by contractRight angleTraffic reportingScaling (geometry)Theory of relativityMechanism design1 (number)Musical ensembleDescriptive statisticsNumberIncidence algebraLibrary (computing)Component-based software engineeringSoftware bugStreaming mediaCybersexState of matterCategory of beingPattern recognitionPublic key certificateVariety (linguistics)LoginInformation technology consultingPersonal digital assistantTouch typingVapor barrierArithmetic progressionOrder (biology)Thermal conductivityElectronic mailing listSpeech synthesisDeclarative programmingRule of inferenceMathematicsComputer crimeComputer animationMeeting/Interview
Information securityComputerSoftware testingVulnerability (computing)Copyright infringementIntegrated development environmentInformationLimit (category theory)Hacker (term)Beta functionSheaf (mathematics)Physical lawRegulator geneProduct (business)System administratorQuicksortLimit (category theory)Right angleNeuroinformatikMereologyMultiplication signTwitterSoftware bugOffice suiteAuthorizationSoftwareTerm (mathematics)Bound stateMusical ensembleDifferent (Kate Ryan album)9 (number)Process (computing)Data conversionType theoryInstance (computer science)Self-organizationMathematicsCivil engineeringEvoluteVulnerability (computing)WordNormal (geometry)Drop (liquid)DepictionRule of inferenceLatent heatIncidence algebraTraffic reportingCybersexExploit (computer security)Sign (mathematics)Group actionView (database)Annihilator (ring theory)Component-based software engineeringInformation securityLine (geometry)DemosceneException handlingFrequencyReal numberSound effectHacker (term)Translation (relic)GoogolStreaming mediaFile viewerInternet der DingeDependent and independent variablesAssociative propertyLevel (video gaming)ImplementationFormal languageParameter (computer programming)PlanningArchaeological field surveyBitRepresentation (politics)Electronic program guideMassCASE <Informatik>Goodness of fitArithmetic progressionNumberDisk read-and-write headDivision (mathematics)Standard deviationMoment (mathematics)Flow separationCollaborationismState of matterGame controllerInformationMeasurementStatuteResultantComputer animationLecture/Conference
Convex hullLimit (category theory)Information securityComputerSoftware testingVulnerability (computing)Copyright infringementIntegrated development environmentInformationHacker (term)State of matterTime evolutionNumberWebsitePersonal identification number (Denmark)AuthorizationState of matterFormal languageWeb 2.0Annihilator (ring theory)InformationStatuteCASE <Informatik>Multiplication signGoodness of fitInformation securityLink (knot theory)Traffic reportingInformation privacyExecution unitInternet der DingeNeuroinformatikPasswordCybersexOnline helpExtension (kinesiology)PlanningField (computer science)Scripting languageSheaf (mathematics)Term (mathematics)Physical lawTrailGroup actionBasis <Mathematik>Computer crimePressureStatement (computer science)Open sourceData conversionIP addressDataflowLanding pageVulnerability (computing)Roundness (object)WebsitePhysical systemMereologyEvoluteMeasurementCodeSimilarity (geometry)Office suiteException handlingBitMusical ensembleDivisorDiscrete groupContext awarenessCategory of beingDegree (graph theory)Point (geometry)Different (Kate Ryan album)Differential (mechanical device)Server (computing)Set (mathematics)Level (video gaming)Greatest elementEvent horizonCartesian coordinate systemInformation technology consultingExploit (computer security)Source codeTable (information)QuicksortSqueeze theoremDependent and independent variablesFlagComputer animationMeeting/Interview
NumberWebsiteHacker (term)State of matterContrast (vision)Physical systemInformation securityAuthorizationControl flowSoftware testingSystem identificationInformationVulnerability (computing)Term (mathematics)SubsetInternetworkingInternet service providerNormal (geometry)System administratorCodeComputer crimeProduct (business)Computer networkData managementAuthorizationVulnerability (computing)CodeRegulator genePatch (Unix)Physical lawRoundness (object)Hacker (term)Table (information)Quantum statePairwise comparisonFormal languageNeuroinformatikSoftware bugSheaf (mathematics)QuicksortSlide ruleState of matterDirection (geometry)System administratorInternetworkingDataflowService (economics)AreaSoftwareProduct (business)Point (geometry)Term (mathematics)MereologyProcess (computing)Event horizonRenewal theoryContrast (vision)Arithmetic progressionInformation securityData managementPasswordBounded variationDivisorInclusion mapPoint cloudInstance (computer science)Server (computing)Front and back endsMilitary baseOffice suiteException handlingNatural numberLevel (video gaming)Limit (category theory)Type theoryPlastikkarteOrder (biology)FrequencyExpert systemOpen setNumberDegree (graph theory)outputRule of inferenceComponent-based software engineeringTowerContent (media)Forcing (mathematics)Multiplication signMusical ensembleRight angleLine (geometry)Presentation of a groupEvoluteComputer animation
InformationVulnerability (computing)ComputerInformation securityCopyright infringementComputer wormNetwork topologyComputer programChi-squared distributionBasis <Mathematik>Hill differential equationWorld Wide Web ConsortiumNewton's law of universal gravitationPrinciple of maximum entropyIntegrated development environmentComputer-generated imageryProduct (business)TelecommunicationComponent-based software engineeringPoint (geometry)NeuroinformatikNumbering schemeDependent and independent variablesException handlingPhysical lawInformation securityAddress spaceLine (geometry)Internet der DingeHacker (term)Office suiteAreaRight angleSimilarity (geometry)LengthInsertion lossStandard deviationCapability Maturity ModelMoment (mathematics)outputVulnerability (computing)Open setInformation technology consultingRevision controlProcess (computing)QuicksortPublic key certificateElectronic mailing listSelf-organizationCybersexVector potentialProcedural programmingArithmetic progressionComputer programmingAuditory maskingTouch typingVariety (linguistics)Vapor barrierDesign by contractOrder (biology)Thermal conductivityMessage passingComputer animation
File viewerVulnerability (computing)Sign (mathematics)QuicksortReal numberLattice (order)View (database)Civil engineeringPhysical lawTerm (mathematics)Arithmetic progressionIncidence algebraTranslation (relic)MereologyArchaeological field surveyBitNumberRegulator geneImplementationLevel (video gaming)Right angleElectronic program guideProduct (business)Streaming mediaException handlingAnnihilator (ring theory)Goodness of fitSoftware bugRepresentation (politics)Information securityState of matterComputer programmingPattern recognitionLine (geometry)Different (Kate Ryan album)Traffic reportingMeeting/Interview
WordNormal (geometry)Office suiteInstance (computer science)Data conversionType theoryRule of inferenceIncidence algebraQuicksortRegulator geneTraffic reportingVulnerability (computing)Sign (mathematics)Exception handlingGroup actionSystem administratorPhysical lawView (database)Right angleMultiplication signGoodness of fitAnnihilator (ring theory)Different (Kate Ryan album)Disk read-and-write headDivision (mathematics)Software bugProcess (computing)Term (mathematics)Computer programmingNeuroinformatikService (economics)Discrete groupHacker (term)Information securityAuthorizationNumberEvoluteCybersexLine (geometry)Bound stateEndliche ModelltheorieMeeting/Interview
Information securitySheaf (mathematics)ComputerSoftware testingVulnerability (computing)Office suitePhysical lawPoint (geometry)Discrete groupDecision theoryDegree (graph theory)Cartesian coordinate systemSet (mathematics)ConsistencyGreatest elementMechanism designState of matterMeeting/Interview
Point (geometry)Process (computing)FlagLevel (video gaming)TelecommunicationAreaPresentation of a groupLimit (category theory)Physical lawTable (information)State of matterMultiplication signNumberType theoryGroup actionCASE <Informatik>Expert systemOpen setFrequencyForcing (mathematics)TowerSqueeze theoremQuicksortRight angleDependent and independent variablesDegree (graph theory)AuthorizationSoftwareoutputPlastikkarteRule of inferenceMeeting/Interview
Transcript: English(auto-generated)