A “Grey Hat” Guide for Security Researchers

The following is a verbatim reproduction of Jennifer Granick’s original post
In counseling computer security researchers, I have found the law to be a real obstacle to solving vulnerabilities. The muddy nature of the laws that regulate computers and code, coupled with a series of abusive lawsuits, gives researchers real reason to worry that they might be sued if they publish their research or go straight to the affected vendor.

By reporting the security flaw, the researcher reveals that she may have committed unlawful activity, which might invite a lawsuit or criminal investigation. On the other hand, withholding information means a potentially serious security flaw may go unremedied. I discuss this problem, and offer some ideas about what researchers can do about it, in a new document called “A ‘Grey Hat’ Guide”. Constructive feedback is welcome, as I can use it to improve the paper.


You may read the Grey Hat Guide here

Related Posts

Install appmenu-qt, HUD-like application, on Linux Mint 12 KDE Many articles have already been written about Ubuntu's HUD, or Head-Up Display, a feature that is expected on future versions of the popular distribut...
Trying to prevent browser fingerprinting? The odds are against you With recent revelations about browser fingerprinting, the race is on to find ways and means that will help reduce your browser's fingerprint, and with...
Fedora 13 btrfs installation guide In the last article about btrfs on Fedora, we showed how to pass the btrfs option to Anaconda, the Fedora system installation program, on Fedora 13. T...
How to play Windows games in Linux So, you just started using Linux, but found out that your favorite Windows games and applications do not have a Linux edition. What should you do then...
4 gui applications for installing Linux from USB key The traditional and most common method of installing Linux is by burning the installation ISO image to a CD or DVD. But with many laptops, notebooks, ...
How to dual-boot Windows 7 and Chakra Linux Archimedes, with shared NTFS partition at the ... The first article on dual-booting Windows 7 and Chakra Linux, involved Chakra Edn, the edition of Chakra with BURG as the boot loader (see How to dual...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*