Reverse engineering vs illegal hacking: Difference between revisions
→Full solutions: Better organized the full solutions section. |
→Guidelines for safe reverse engineering and enabling your products to work as intended: Update headline |
||
Line 75: | Line 75: | ||
While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. For a safer approach, it is advised to carefully check the local legislation. Often times challenges come from the "legal speech" being difficult to understand by untrained personnel. [[wikipedia:Large_language_model|Large Language Models]]<ref>{{Cite web |title=Large Language Model |url=https://en.wikipedia.org/wiki/Large_language_model |url-status=live |website=Wikipedia}}</ref> (LLMs) could aid the legal research process, the bigger cloud-based LLMs often performing the best, double checking the information is mandatory. | While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. For a safer approach, it is advised to carefully check the local legislation. Often times challenges come from the "legal speech" being difficult to understand by untrained personnel. [[wikipedia:Large_language_model|Large Language Models]]<ref>{{Cite web |title=Large Language Model |url=https://en.wikipedia.org/wiki/Large_language_model |url-status=live |website=Wikipedia}}</ref> (LLMs) could aid the legal research process, the bigger cloud-based LLMs often performing the best, double checking the information is mandatory. | ||
===Guidelines for | ===Guidelines for safer reverse engineering=== | ||
To better understand the position a RE would find themselves into, it is recommended to try and understand where the manufacturer is acting upon their product. We can briefly categorize the potential infringement on three levels: | To better understand the position a RE would find themselves into, it is recommended to try and understand where the manufacturer is acting upon their product. We can briefly categorize the potential infringement on three levels: | ||
* Hardware | *Hardware | ||
* Software | *Software | ||
* Hardware + Software | *Hardware + Software | ||
Each one of these has it's own technical challenges and will most likely be treated differently in the court of law. | Each one of these has it's own technical challenges and will most likely be treated differently in the court of law. |