Comment by 0xDEAFBEAD
2 months ago
>This type of vulnerability is extremely valuable for private investigators, too. "Who uploaded this video which my client is extremely interested in?"
Would exploiting this vulnerability violate the Computer Fraud and Abuse Act? If so, would a private investigator really want to do that?
The CFAA is so broad that it's really for the prosecutor to decide you're evil hacker and go after you, even if you didn't do anything bad. Like use view source in a web browser. A PI works around legally grey things anyway, what's the CFAA on top of that?
https://www.stltoday.com/news/local/government-politics/pars...