-Again, grey hat hacker is built around trust. While the actions look the
-same, a grey hat hacker will not look at the compromised data and will not
-plant back doors. Therefore it is very important that specialized police
-officers monitor the web and, when necessary, hack and test systems.
+Grey hat hacking, as is digital property is built around trust. Moreover, while
+the actions of a black and grey hat hacker look the same, a grey hat hacker
+will not misuse the system by for example planting back doors. To notice the
+difference between black and grey hat one has to know and master the
+techniques,
+
+All of this means that there is an extremely thin line between grey and black
+hat hacking. Some might even argue that there is no difference. Allowing or
+even encouraging grey hat hacking leads to the classical slippery slope
+problem. The best solution would be to tolerate, not actively chasing them,
+grey hat hackers and keep testing the boundaries using judges and lawyers. In
+this way true grey hat hackers will only be bothered and not punished and true
+black hat hackers will be punished true the court of law.