Re: Botters get pwned by Taj...
I believe in legal terms this is called fruit of a poisoned tree. The damage has already been done, but to go forward and use the information would be to encourage or validate the act. Suppose a police officer were to say to an informant that he needs certain information but he's not going to ask anyone to break into his records and obtain it. If the informant takes the hint and performs an illegal act to obtain the necessary evidence, a court most likely wouldn't allow it to be submitted.
This isn't court, so there isn't a legal barrier but there's still something of an ethical dilemma. If SE uses the list in any way, then it could be said that the hack was a "good thing" or that it "got results" which would likely encourage Taj or copycat hackers to repeat the illegal act to help or encourage their target organizations into taking the action they want.
I believe in legal terms this is called fruit of a poisoned tree. The damage has already been done, but to go forward and use the information would be to encourage or validate the act. Suppose a police officer were to say to an informant that he needs certain information but he's not going to ask anyone to break into his records and obtain it. If the informant takes the hint and performs an illegal act to obtain the necessary evidence, a court most likely wouldn't allow it to be submitted.
This isn't court, so there isn't a legal barrier but there's still something of an ethical dilemma. If SE uses the list in any way, then it could be said that the hack was a "good thing" or that it "got results" which would likely encourage Taj or copycat hackers to repeat the illegal act to help or encourage their target organizations into taking the action they want.
Comment