...you may have just confessed to a crime.
Since their system is not log-in/password based, nor is it cookie-based, I naturally advocate circumventing their system with perfectly legal means of doing so.
I'd have to argue that this isn't "perfectly legal."
In Arizona, and many states, "a person who acts without authority or who exceeds authorization of use commits computer tampering by knowingly accessing any computer, computer system or network that is operated by this state, a political subdivision of this state or a medical institution."
This is a class 6 felony. In addition, "upon conviction... the court shall order that any computer system or instrument of communication that was owned or used exclusively by the defendant and that was used in the commission of the offense be forfeited and sold, destroyed or otherwise properly disposed."
Just because you found a way to "circumvent their system" doesn't make it "perfectly legal." Naturally, I advocate NOT breaking the law.
to post a reply:
login - or -
register