Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Beeper doesn't "hack" anything though, it uses the exact same authorization mechanism as a real iOS device and grants the user access to no more than a real device would.

I agree that the CFAA can be abused to try and prosecute this (as well as the DMCA), and I suspect Beeper is intentionally hoping for (heavily publicized) litigation to settle this once and for all and set a precedent.



> it uses the exact same authorization mechanism as a real iOS device and grants the user access to no more than a real device would.

And a hacker that social engineers someone's bank password is entering just like the account owner would. "Hacking" doesn't have to involve exploiting a technical vulnerability. It's just unauthorized system access, regardless of methodology




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: