Reverse engineering vs illegal hacking: Difference between revisions
→References: fix |
→Full solutions: Better organized the full solutions section. |
||
Line 76: | Line 76: | ||
===Guidelines for safe reverse engineering and enabling your products to work as intended=== | ===Guidelines for safe reverse engineering and enabling your products to work as intended=== | ||
To better understand the position a RE would find themselves into, it is recommended to try and understand where the manufacturer is acting upon their product. We can briefly categorize the potential infringement on three levels: | |||
* Hardware | |||
* Software | |||
* Hardware + Software | |||
Each one of these has it's own technical challenges and will most likely be treated differently in the court of law. | |||
====Full solutions==== | ====Full solutions==== | ||
The solutions are usually not complete, since the manufacturer sadly has most of the control over your product, whatever might it be. Almost complete solutions are a more likely term as most actions are rather ''reactive'' than ''proactive'' because the consumer will firstly be hit by the overreach and then react to it. | |||
====Partial solutions==== | ====Partial solutions==== |