Try our sponsor Aura 14 days for free - https://aura.com/nano - to see how many times your personal information was found on the internet!Scammers PANIC Afte...
That argument doesn’t work, all you’re doing is pointing out the issues with vigilantism. He’s also committing a crime, are the scammers now in the right too since they’re targeting a suspected criminal?
Accessing a system you’re not authorised to access, regardless of how that access was obtained, is generally not legal. The way to sort that out is, you guessed it, a trial.
When someone opens a connection on your network you are not obligated to avoid utility of those connected systems. It is not a crime to connect to things which have willfully joined your network.
If someone puts a camera on your network, you can view it. Authorization is moot when it’s in your house.
Edit I agree if you seek out someone else’s network and connect to and operate devices there.
Edit edit put simply they forfeit any expectations of privacy when they open a connection to his network
This is very untrue and you definitely shouldn’t be giving out legal advice like this on topics you’re not knowledgeable on, but exactly which part is a crime and how criminal it is will depend on your local laws. Some such computer misuse laws are intentionally written very broadly with generic wording precisely so that edge cases such as unintentionally granting an unauthorised party access to a system does not clear them of wrongdoing when they do so.
As for how to tell which laws are relevant and whether you’ve breached them? Well, I’m sure the answer will shock you.
Further, they opened 2 way remote desktop connectivity. That is a literal invitation
Edit now that that is covered, and completely distinct from all previous points and lines of discussion, it’s pretty shady to be looking for legal safe harbor for scammers who rob people all over the world every day.
They are opening persistent 2 way connections to people’s machines with the clear goal of destroying them. There is little argument to suggest it is inappropriate to observe them while they do it.
That would be a sound argument if they weren’t doing the crime right there on the video.
I suggest you read the next few words in that sentence which you conveniently left out of your quote, might help clear up any confusion.
It’s not a legal proceeding, he’s the (very capable) victim of a crime at that moment. It’s his experience as an individual, not an authority.
It’s like if he had a security camera on his front porch and filmed porch pirates stealing his deliveries, then turned his sprinkler on
That argument doesn’t work, all you’re doing is pointing out the issues with vigilantism. He’s also committing a crime, are the scammers now in the right too since they’re targeting a suspected criminal?
This is why trials exist.
What crime? He’s accessing resources they connected to his network
Accessing a system you’re not authorised to access, regardless of how that access was obtained, is generally not legal. The way to sort that out is, you guessed it, a trial.
When someone opens a connection on your network you are not obligated to avoid utility of those connected systems. It is not a crime to connect to things which have willfully joined your network.
If someone puts a camera on your network, you can view it. Authorization is moot when it’s in your house.
Edit I agree if you seek out someone else’s network and connect to and operate devices there.
Edit edit put simply they forfeit any expectations of privacy when they open a connection to his network
This is very untrue and you definitely shouldn’t be giving out legal advice like this on topics you’re not knowledgeable on, but exactly which part is a crime and how criminal it is will depend on your local laws. Some such computer misuse laws are intentionally written very broadly with generic wording precisely so that edge cases such as unintentionally granting an unauthorised party access to a system does not clear them of wrongdoing when they do so.
As for how to tell which laws are relevant and whether you’ve breached them? Well, I’m sure the answer will shock you.
Nothing on lemmy is legal advice lmao.
Further, they opened 2 way remote desktop connectivity. That is a literal invitation
Edit now that that is covered, and completely distinct from all previous points and lines of discussion, it’s pretty shady to be looking for legal safe harbor for scammers who rob people all over the world every day.
They are opening persistent 2 way connections to people’s machines with the clear goal of destroying them. There is little argument to suggest it is inappropriate to observe them while they do it.