Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Penetration "testing" networks you have no permission to use looks identical to a real attack. I doubt Apple will look at him any differently than an attacker if they decide to pursue him.

He refers to Facebook's whitehat list too. Facebook does allow people to try to break parts of their application if they're responsible about the disclosure. To my knowledge Apple doesn't have such a policy so can't have given any implied permission to attempt to attack them.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: