A “Grey Hat” Guide for Security Researchers

The following is a verbatim reproduction of Jennifer Granick’s original post
In counseling computer security researchers, I have found the law to be a real obstacle to solving vulnerabilities. The muddy nature of the laws that regulate computers and code, coupled with a series of abusive lawsuits, gives researchers real reason to worry that they might be sued if they publish their research or go straight to the affected vendor.

By reporting the security flaw, the researcher reveals that she may have committed unlawful activity, which might invite a lawsuit or criminal investigation. On the other hand, withholding information means a potentially serious security flaw may go unremedied. I discuss this problem, and offer some ideas about what researchers can do about it, in a new document called “A ‘Grey Hat’ Guide”. Constructive feedback is welcome, as I can use it to improve the paper.


You may read the Grey Hat Guide here

Related Posts

Tahoe Least-Authority File System for secure, distributed data storage Looking for a solution to give you an edge in the ongoing struggle between you and the authorities over the privacy of your data? Then you should take...
Manual disk partitioning guide for Linux Mint Debian Edition Linux Mint Debian Edition, or LMDE, is the edition of Linux Mint based on Debian Testing. The latest release was made available for download on Decemb...
How to configure LVM on Mandriva One 2010 Mandriva One is one of three desktop Linux distributions published by Mandriva. It is a Live CD edition with the option to install to hard disk. Mand...
LVM Configuration in Ubuntu 8.10 There are two desktop editions of Ubuntu, the popular Linux distribution. The one most people are used to is the Live CD version, the edition that all...
How to use Deepin 2014 Guest account Deepin 2014 ships with a guest user account, but you'll need to enable it before you can use it. It took me a while before I figured out how to use it...
How to dual-boot Linux Mint 17.2, Windows 10, Windows 8.1 on a PC with UEFI firmware This tutorial shows how to dual-boot Linux Mint 17.2 and either Windows 10 or Windows 8.1 on a single hard disk drive and on a computer with UEFI firm...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*