Reverse engineering vs illegal hacking: Difference between revisions

APTenthusiast (talk | contribs)
Full solutions: Better organized the full solutions section.
Line 76: Line 76:


===Guidelines for safe reverse engineering and enabling your products to work as intended===
===Guidelines for safe reverse engineering and enabling your products to work as intended===
To better understand the position a RE would find themselves into, it is recommended to try and understand where the manufacturer is acting upon their product. We can briefly categorize the potential infringement on three levels:
* Hardware
* Software
* Hardware + Software
Each one of these has it's own technical challenges and will most likely be treated differently in the court of law.


====Full solutions====
====Full solutions====
The solutions are usually not complete, since the manufacturer sadly has most of the control over your product, whatever might it be. Almost complete solutions are a more likely term as most actions are rather ''reactive'' than ''proactive'' because the consumer will firstly be hit by the overreach and then react to it.


====Partial solutions====
====Partial solutions====