Hacker News new | past | comments | ask | show | jobs | submit login

They can pursue what they want, it doesn't mean it will go through.

Looking at public data, using some other public knowledge to figure out something new does not make it inherently illegal. They didn't crack it on their systems, they didn't subvert it on their systems, they did not use it against their systems. I'd love to see some specific examples under what it could be prosecuted under specifically. Because "that door doesn't actually have a lock" or "the king doesn't actually have clothes" is not practically prosecutable anywhere normal just like that.

Especially in the EU, making such cryptographic blunders might even fall foul of NIS2, should it apply to you.

In general this also quickly boils down to the topic of "illegal numbers" (https://en.wikipedia.org/wiki/Illegal_number) as well.




It's more like the door has a weak lock that can be picked. Just like many real world doors do. Here's how it would go in court:

"Are you aware that this key could be used to decrypt information and impersonate X?"

"Are you aware that this key is commonly called a Private key?"

"Are you aware that this key is commonly called a Secret key?"

"Are you aware that it is common to treat these with high sensitivity? Protecting them from human eyes, using secure key management services and so on?"

"Was it even necessary to target someone else's secret private key to demonstrate that 512-bit keys can be cracked?"

"Knowing all of this, did you still willfully and intentionally use cracking to make a copy of this secret private key?"

I wouldn't want to be in the position of trying to explain to a prosecutor, judge, or jury why it's somehow ok and shouldn't count. The reason I'm posting at all here is because I don't think folks are thinking this risk through.


If you want to continue with the analogies, looking at a lock and figuring out it's fake does not constitute a crime.

That key can not be used to decrypt anything. Maybe impersonate, but the researchers haven't done that. It's also difficult to claim something is very sensitive, private or secure if you're publicly broadcasting it, due to the fact that the operation to convert one to an another is so absolutely trivial.

And they did not make a copy of their private key, they did not access their system in a forbidden way. They calculated a new one from publicly accessible information, using publicly known math. It's like visually looking at something and then thinking about it hard.

I wouldn't want to explain these things either, but such a prosecution would be both bullshit and a landmark one at the same time.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: