A “Grey Hat” Guide for Security Researchers

The following is a verbatim reproduction of Jennifer Granick’s original post
In counseling computer security researchers, I have found the law to be a real obstacle to solving vulnerabilities. The muddy nature of the laws that regulate computers and code, coupled with a series of abusive lawsuits, gives researchers real reason to worry that they might be sued if they publish their research or go straight to the affected vendor.

By reporting the security flaw, the researcher reveals that she may have committed unlawful activity, which might invite a lawsuit or criminal investigation. On the other hand, withholding information means a potentially serious security flaw may go unremedied. I discuss this problem, and offer some ideas about what researchers can do about it, in a new document called “A ‘Grey Hat’ Guide”. Constructive feedback is welcome, as I can use it to improve the paper.


You may read the Grey Hat Guide here

Related Posts

StackFolder and KLook integration Last November, I published an article titled 2 cool reasons to use the K Desktop Environment. The reasons I cited in that article, are two application...
How to install Ubuntu 14.04 on encrypted MBR partitions This tutorial shows how to install Ubuntu 14.04 on encrypted MBR partitions. It is only slightly different from Manual full disk encryption setup guid...
Finalterm now has tabs, horizontal and vertical split screens Finalterm, a terminal emulator that's being developed by Philipp Emanuel Weidmann, a mathematician and Linux Software Engineer from Heidelberg, German...
Is that a backdoor or an “administrative password” on your Verizon Internet ro... If Verizon was your Internet Service Provider back in April 2011, you probably received an updated Terms of Service (TOS) spelling out several updates...
GNOME 3.12: The cool and the not-so cool features GNOME 3.12 was released on March 26 (2014), but it didn't start shipping on many distributions until very recently. In this post, I'll let you in on w...
Apply the nuke patch to LUKS cryptsetup in Linux Mint 16 and Ubuntu 13.10 This short tutorial shows how to apply the Kali Linux nuke patch to LUKS cryptsetup in Linux Mint 16 and Ubuntu 13.10. From a physical security and...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*