Comment by derefr
11 years ago
Note also that the program could pay someone to actually go and buy some hardware and set it up in a co-lo or what-have-you. That person would be doing work-for-hire for the corporate entity the program controls, so the corporation, not the person, would end up owning the hardware. Then the program could copy itself onto said hardware. Now who's responsible?
No comments yet
Contribute on Hacker News ↗