Pro@programming.dev to memes@lemmy.worldEnglish · 4 months agoAnother Tea memeprogramming.devimagemessage-square95linkfedilinkarrow-up1327arrow-down141cross-posted to: [email protected]
arrow-up1286arrow-down1imageAnother Tea memeprogramming.devPro@programming.dev to memes@lemmy.worldEnglish · 4 months agomessage-square95linkfedilinkcross-posted to: [email protected]
minus-squareDelphia@lemmy.worldlinkfedilinkarrow-up1·4 months agoI mean how anonymous you need to be depends entirely on how legal the method you found the data is.
minus-squareGanbat@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·4 months agoNot really. I’ve heard stories about people getting sued after finding vulnerabilities. Of course the cases would get thrown out, but that’s assuming you can eat the mountains of legal fees it’ll take to actually get to a judge.
Emphasis on anonymously.
I mean how anonymous you need to be depends entirely on how legal the method you found the data is.
Not really. I’ve heard stories about people getting sued after finding vulnerabilities. Of course the cases would get thrown out, but that’s assuming you can eat the mountains of legal fees it’ll take to actually get to a judge.