Reasearch 'on' the system and 'within' the system are distinct.
What @peterboghossian et al. did was necessary, and could not be done within the normal protocol.
Phony fields depend on rules that prevent anyone from testing the hypothesis that they are analytically empty.https://twitter.com/besttrousers/status/1082414304618524673 …
-
-
This would be grey hat; white hat would be the kind that’s actually hired by a firm to audit them. Black hat of course is purely exploiting for own gain. Grey hat is audit without permission. Sadly, PSUs response is exactly what many grey hats get.
-
I should add that the firms that respond the way PSU is responding get eviscerated during lunch breaks by engineers who give a damn about systems security; and we don’t tend to recommend them or do work with them.
End of conversation
New conversation -
-
-
Good point. There are usually guidelines for white hat hackers; perhaps similar guidelines could be created for "white hat hoaxers"?
-
One of the lessons from cyber security is that while the good guys are following the rules the black hats are not, and they are a lot less likely to disclose their findings. This pushes for loosening the rules on white hats to decrease the asymmetry.
End of conversation
New conversation -
-
-
Yep, a company's Red Team is paid to this very thing. Find vulnerabilities in their system and exploit it
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I like the term 'penetration testing'.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.