Reverse engineering vs illegal hacking: Difference between revisions
Added clarification and suggestions for understanding the local law in the EU. |
→Introduction and Overview: Added wireframes for the EU guidelines and legal precedents |
||
| Line 97: | Line 97: | ||
While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. For a safer approach, it is advised to carefully check the local legislation. Often times challenges come from the "legal speech" being difficult to understand by untrained personnel. [[wikipedia:Large_language_model|Large Language Models]]<ref>{{Cite web |title=Large Language Model |url=https://en.wikipedia.org/wiki/Large_language_model |url-status=live |website=Wikipedia}}</ref> (LLMs) could aid the legal research process, the bigger cloud-based LLMs often performing the best, double checking the information is mandatory. | While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. For a safer approach, it is advised to carefully check the local legislation. Often times challenges come from the "legal speech" being difficult to understand by untrained personnel. [[wikipedia:Large_language_model|Large Language Models]]<ref>{{Cite web |title=Large Language Model |url=https://en.wikipedia.org/wiki/Large_language_model |url-status=live |website=Wikipedia}}</ref> (LLMs) could aid the legal research process, the bigger cloud-based LLMs often performing the best, double checking the information is mandatory. | ||
=== | ===Guidelines for safe reverse engineering and enabling your products to work as intended=== | ||
==== Full solutions ==== | |||
==== Partial solutions ==== | |||
=== Legal precedents === | |||
==Narrowing computer hacking laws== | ==Narrowing computer hacking laws== | ||