Reverse engineering vs illegal hacking: Difference between revisions

APTenthusiast (talk | contribs)
Full solutions: Better organized the full solutions section.
APTenthusiast (talk | contribs)
 
Line 75: Line 75:
While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. For a safer approach, it is advised to carefully check the local legislation. Often times challenges come from the "legal speech" being difficult to understand by untrained personnel. [[wikipedia:Large_language_model|Large Language Models]]<ref>{{Cite web |title=Large Language Model |url=https://en.wikipedia.org/wiki/Large_language_model |url-status=live |website=Wikipedia}}</ref> (LLMs) could aid the legal research process, the bigger cloud-based LLMs often performing the best, double checking the information is mandatory.
While this is the general E.U. law, each country has it's own interpretation on it, the Directive being more of a guideline. For a safer approach, it is advised to carefully check the local legislation. Often times challenges come from the "legal speech" being difficult to understand by untrained personnel. [[wikipedia:Large_language_model|Large Language Models]]<ref>{{Cite web |title=Large Language Model |url=https://en.wikipedia.org/wiki/Large_language_model |url-status=live |website=Wikipedia}}</ref> (LLMs) could aid the legal research process, the bigger cloud-based LLMs often performing the best, double checking the information is mandatory.


===Guidelines for safe reverse engineering and enabling your products to work as intended===
===Guidelines for safer reverse engineering===
To better understand the position a RE would find themselves into, it is recommended to try and understand where the manufacturer is acting upon their product. We can briefly categorize the potential infringement on three levels:
To better understand the position a RE would find themselves into, it is recommended to try and understand where the manufacturer is acting upon their product. We can briefly categorize the potential infringement on three levels:


* Hardware
*Hardware
* Software
*Software
* Hardware + Software
*Hardware + Software


Each one of these has it's own technical challenges and will most likely be treated differently in the court of law.  
Each one of these has it's own technical challenges and will most likely be treated differently in the court of law.