e59d62eac589b2939df8088cd277ccf0b3a06521
[paefcais1617.git] / assignment2 / a.tex
1 %&a
2 \begin{document}
3 \maketitleru[authorstext={Author:},
4 course={Philosophy and Ethics of Computer and Information Sciences}]
5 \section{Grey Hat Cracking Should Be Legalized}
6 In the digital world the notion of property is significantly different than the
7 notion of property in the real world. Property in the digital world can be
8 interchanged, duplicated and changed without physical intervening. This means
9 that property and ownership is much more a matter of trust and regulations than
10 anything of material kind. By this definition the notion of \emph{going
11 equipped} in the digital world is vastly different than in the physical world.
12 One can go \emph{non-equipped} but having the tools within reach and the other
13 way around. There is hardly a concept of distance in the digital world.
14
15 Grey hat hacking means black hat hacking with good intents. Grey hat hacking is
16 not hacking for the sake of cracking but for the sake of improving the security
17 and notifying the owner of the system. Often this is compared to breaking into
18 a house and informing the owners on how to improve their door locks. However,
19 with the aforementioned notion of property, this is not an analogous issue.
20 Grey hat hacking, as is digital property is built around trust. Moreover, while
21 the actions of a black and grey hat hacker look the same, a grey hat hacker
22 will not misuse the system by for example planting back doors. To notice the
23 difference between black and grey hat one has to know and master the
24 techniques,
25
26 All of this means that there is an extremely thin line between grey and black
27 hat hacking. Some might even argue that there is no difference. Allowing or
28 even encouraging grey hat hacking leads to the classical slippery slope
29 problem. The best solution would be to tolerate, not actively chasing them,
30 grey hat hackers and keep testing the boundaries using judges and lawyers. In
31 this way true grey hat hackers will only be bothered and not punished and true
32 black hat hackers will be punished true the court of law.
33
34 \section{Web Scrapers and Robot Denial Files}
35
36 \section{An Immune System for the Internet}
37 The idea of benevolent viruses patching security holes is a outright terrible
38 idea because of a set of reasons.
39
40 Firstly this breaches the privacy of the user. Analogous, a burglar that breaks
41 into a house to install better locks would be considered wrong as well. The
42 system is property of the user and the internet has been an anarchistic place
43 that had no rules and regulations. If the user chooses not to protect their
44 system then that is their own loss. However, when the system also attacks other
45 systems it should be fixed. This is not always the case and depending on the
46 view on the internet of the user breaking into the system is worse then a
47 possible attack on the system. This case is a living example of the security
48 versus privacy duality. Unprotected users are unwanted invaded by, apparently
49 benevolent, worms. Who can proof these worms are benevolent, who develops them,
50 those questions become very relevant.
51 \end{document}