Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Doesn't this violate the computer fraud and abuse act, for unauthorized accessing to a networks without permission? More specifically, piggybacking [1]?

[1] https://en.wikipedia.org/wiki/Legality_of_piggybacking



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: