Bitcoin Forum
May 24, 2024, 03:41:20 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: [1]
  Print  
Author Topic: Maybe some hacks should not be illegal  (Read 212 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
saxydev (OP)
Member
**
Offline Offline

Activity: 429
Merit: 52


View Profile WWW
September 01, 2022, 05:49:59 PM
 #1

Hey there,

I was doing my research on hacks so far in 2022 and I had a thought in my mind.

Why are hacks on smart contracts on smart contracts seen as illegal? Why stealing btc from someone's private key is seen as malicious?

Don't get me wrong here: but your keys, your crypto. I don't think someone can't say the other way arround, right? Ownership can be proven only by having the private key to your coins.

And about smart contracts, the moment someone is using a smart contract he agrees with the code of the smart contract. As a decentralysed network, if someone abuses of that code that is an issue of the code developer or of the owners of the specific contract(holders) as much. There was a specific hack this year, I won't name it, and on slack the owner received a simple question: "You have paid for an audit, how's possible they didn't notice such a obvious breach?" and he answered: "Because it costed only 69k$". Take the crema hack for example..

So what are your opinions? Should hacks on decentralysed networks to be not judged?


local rule: any spam signature post will be deleted
ryzaadit
Legendary
*
Offline Offline

Activity: 2478
Merit: 1228



View Profile
September 01, 2022, 07:40:27 PM
Last edit: September 01, 2022, 07:54:20 PM by ryzaadit
Merited by GazetaBitcoin (1)
 #2

I think you should try to understand the meaning of hacking itself first:

Quote
The activity of using a computer to access information stored on another computer system without permission, or to spread a computer virus:

This means, that while you're accessing someone's information you need to gain permission from the owner. Can they give the permission or not, the permission can be granted before or after (As long as for the good things of the owner itself, without taken advantage from your activity).

Back to the topic.
Quote
Why stealing btc from someone's private key is seen as malicious?
In this question, you question stealing right?

Based on your question, we already have get the answer. Since is stealing, meaning that the private key of that victim is not compromised to the public not by the owner but compromised by one person or group while he got targeted accessing information to his device without his authorization. Before you get a suspect is also need several inspect first, how the hacking activity is leading to you.

If they cannot prove that and the court decides not to have enough proof, then you're free (Even though we all know you're the suspect hacking) to go unless you tell by yourself you're hacking them. But that's how the law work, everything is based on investigation, law and statement from both sides.

The smart-contract question is also the same, even if they paid the audit. All activity is based on the law & regulations of each country, every people have no right to accessing, modified someone's information, stuff, etc without permission from the onwer.

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
saxydev (OP)
Member
**
Offline Offline

Activity: 429
Merit: 52


View Profile WWW
September 02, 2022, 03:40:28 AM
 #3

I think you should try to understand the meaning of hacking itself first:

Quote
The activity of using a computer to access information stored on another computer system without permission, or to spread a computer virus:

This means, that while you're accessing someone's information you need to gain permission from the owner. Can they give the permission or not, the permission can be granted before or after (As long as for the good things of the owner itself, without taken advantage from your activity).

Back to the topic.
Quote
Why stealing btc from someone's private key is seen as malicious?
In this question, you question stealing right?

Based on your question, we already have get the answer. Since is stealing, meaning that the private key of that victim is not compromised to the public not by the owner but compromised by one person or group while he got targeted accessing information to his device without his authorization. Before you get a suspect is also need several inspect first, how the hacking activity is leading to you.

If they cannot prove that and the court decides not to have enough proof, then you're free (Even though we all know you're the suspect hacking) to go unless you tell by yourself you're hacking them. But that's how the law work, everything is based on investigation, law and statement from both sides.

The smart-contract question is also the same, even if they paid the audit. All activity is based on the law & regulations of each country, every people have no right to accessing, modified someone's information, stuff, etc without permission from the onwer.


I am not questioning stealing. :Let's just stay in a utopic environment, what if by having access to a private key you don't have to steal, lie or gain access to any kind of private information or activity which may be questionable. Will this be stealing?
vv181
Legendary
*
Offline Offline

Activity: 1932
Merit: 1273


View Profile
September 02, 2022, 04:58:51 AM
 #4

Why are hacks on smart contracts on smart contracts seen as illegal?
What do you mean by it?

Why stealing btc from someone's private key is seen as malicious?

Don't get me wrong here: but your keys, your crypto. I don't think someone can't say the other way arround, right? Ownership can be proven only by having the private key to your coins.

Because by the definition of "steal" conveys it. Yes you may find other belonging, but it is up to you whether to claim it as yours--since you found it-- or return it to the true owner. In another sense, it's up to your moral standard.

And about smart contracts, the moment someone is using a smart contract he agrees with the code of the smart contract.~

Should hacks on decentralysed networks to be not judged?
They might agree but that doesn't mean they have the comprehension. How many of the smart contract users understand software engineering?

It is actually like a regular internet user, how many people do they read the terms of service and privacy policy, it is almost non-existent. ToS and Privacy policy likely contain legal and technical language, a word that may regular Joe don't grasp fully. And here we are dealing with smart contracts.

Back to the question, if the network is truly decentralized, then the participant is inherently judging.
BitKongy
Member
**
Offline Offline

Activity: 405
Merit: 19


View Profile
September 02, 2022, 08:44:29 AM
 #5

Making the villains the super heroes right? Hacking is stealing don't make it look like it's great to be an hacker, the only way to be an hacker and be legal is getting paid trying to hack into projects security and that's after you've agreed to proceed with the team, bounty things you know.
saxydev (OP)
Member
**
Offline Offline

Activity: 429
Merit: 52


View Profile WWW
September 02, 2022, 08:48:42 AM
 #6

Making the villains the super heroes right? Hacking is stealing don't make it look like it's great to be an hacker, the only way to be an hacker and be legal is getting paid trying to hack into projects security and that's after you've agreed to proceed with the team, bounty things you know.

But is it hacking if someone has access to your private keys?
vv181
Legendary
*
Offline Offline

Activity: 1932
Merit: 1273


View Profile
September 02, 2022, 03:19:38 PM
 #7

Making the villains the super heroes right? Hacking is stealing don't make it look like it's great to be an hacker, the only way to be an hacker and be legal is getting paid trying to hack into projects security and that's after you've agreed to proceed with the team, bounty things you know.

But is it hacking if someone has access to your private keys?

Maybe let's define what is "hack" and what is "access" according to thefreedictionary.com

Quote
hack 1  (hăk)
v. hacked, hack·ing, hacks
v.tr.
b. To gain access to (a computer file or network) illegally or without authorization: hacked the firm's personnel database.

Quote
ac·cess  (ăk′sĕs)
n.
1. A means of approaching, entering, exiting, communicating with, or making use of: a store with easy access.
2. The ability or right to approach, enter, exit, communicate with, or make use of: has access to the restricted area; has access to classified material.

Based on that and your question, accessing my own private keys without any probable and reasonable legal authority or simply because of my own personal authorization can be concluded as hacking. I didn't give any permission to anyone to control any of my belonging, in any way, even if it was because of my own mistake, the private keys are illegally controlled, which it can be defined as hacking.
saxydev (OP)
Member
**
Offline Offline

Activity: 429
Merit: 52


View Profile WWW
September 02, 2022, 06:48:04 PM
 #8

Making the villains the super heroes right? Hacking is stealing don't make it look like it's great to be an hacker, the only way to be an hacker and be legal is getting paid trying to hack into projects security and that's after you've agreed to proceed with the team, bounty things you know.

But is it hacking if someone has access to your private keys?

Maybe let's define what is "hack" and what is "access" according to thefreedictionary.com

Quote
hack 1  (hăk)
v. hacked, hack·ing, hacks
v.tr.
b. To gain access to (a computer file or network) illegally or without authorization: hacked the firm's personnel database.

Quote
ac·cess  (ăk′sĕs)
n.
1. A means of approaching, entering, exiting, communicating with, or making use of: a store with easy access.
2. The ability or right to approach, enter, exit, communicate with, or make use of: has access to the restricted area; has access to classified material.

Based on that and your question, accessing my own private keys without any probable and reasonable legal authority or simply because of my own personal authorization can be concluded as hacking. I didn't give any permission to anyone to control any of my belonging, in any way, even if it was because of my own mistake, the private keys are illegally controlled, which it can be defined as hacking.

But can be a private key illegally controled? Do you own the coins or do you own a key to access the ledger? This is my question, remember the hack against the pancakeswap admin, maybe not the best example, but still
serjent05
Legendary
*
Offline Offline

Activity: 2856
Merit: 1255


View Profile
September 02, 2022, 07:14:03 PM
 #9

There are hacks that are not illegal.  For that, we can go down to kinds of hackers.

There is this..
White Hat
Quote
Enter the White Hat hacker, the good guy who uses his (or her) capabilities to damage your organization — but only hypothetically. Instead, the real purpose is to uncover security failings in your system in order to help you safeguard your business from the dangerous hackers.

The Black Hat
Quote
What is a black hat hacker?
Image result for what is white hat hacker
A black hat hacker is typically one that engages in cybercrime operations and uses hacking for financial gain, cyber espionage purposes or other malicious motives, like implanting malware into computer systems.

And the one that traverses in between

The Gray Hats
Quote
Some Gray Hat hackers like to believe they're doing something good for companies by hacking their websites and invading their networks without permission, but company owners rarely appreciate unauthorized forays into their business information infrastructure.

In most cases, a Gray Hat's real intention is to show off his skills and gain publicity — maybe even appreciation — for what he considers a contribution to cybersecurity.

White hat hackers have the consent to hack the server of a company that hire them to look for holes and glitches in the program used in their service.  This kind of hacking is legal because of the agreement of the owner and the hacker.



But can be a private key illegally controled? Do you own the coins or do you own a key to access the ledger? This is my question, remember the hack against the pancakeswap admin, maybe not the best example, but still

If you gain your access thru illegal means, the next steps will definitely illegal.  You cannot say what you did is legal when you did get your access illegally, (please refer to the given definition of hack).  Unless you have the consent of the owner of the privatekey.  
o48o
Legendary
*
Offline Offline

Activity: 2870
Merit: 1132


Leading Crypto Sports Betting & Casino Platform


View Profile
September 02, 2022, 07:24:14 PM
 #10

I kinda agree with you at some level and data should be free. But just because you can access to someone's private key, it's nearly impossible that you came up with that by an accident. As the data is private it could be equivalent to getting your email breached. Or leaving your front door open. It would still be illegal to enter.


Maybe let's define what is "hack" and what is "access" according to thefreedictionary.com

Quote
hack 1  (hăk)
v. hacked, hack·ing, hacks
v.tr.
b. To gain access to (a computer file or network) illegally or without authorization: hacked the firm's personnel database.

Quote
ac·cess  (ăk′sĕs)
n.
1. A means of approaching, entering, exiting, communicating with, or making use of: a store with easy access.
2. The ability or right to approach, enter, exit, communicate with, or make use of: has access to the restricted area; has access to classified material.

As an old computer geek, this is a common misconception and not any serious dictionary would define it like that. Hacker is a computer enthusiast and word hacking has been tainted by people who don't understand the whole scene and see computer experts as scary criminals just because they COULD use it to illegal purposes.

Word describing gaining access illegally should be Cracker, which is the word that was commonly used by "the scene" because they cracked systems for their own benefit or the benefit for others.


..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
antsam
Full Member
***
Offline Offline

Activity: 2044
Merit: 109


View Profile WWW
September 03, 2022, 02:13:36 AM
 #11

It's terrible the perception you want to build, how can a hack or theft be legal just because it's like the logic you build. From a legal point of view hacking is clearly wrong even if you mean it.
Reid
Hero Member
*****
Offline Offline

Activity: 2898
Merit: 642


View Profile
September 03, 2022, 04:44:26 AM
 #12

Is this some conscience thing? Like psychologically it should be right if the hacker didn't mean to access one funds/private keys? Like picking up money that is dropped by someone else and no one is claiming it? No, I don't think so. We put those at lost and found section.
Think about it, what if it's your private key that was hacked and you don't even have any idea why or how it happened. Just one good hacker targeted you.
Will that be a fun feeling?
It's illegal, it doesn't matter if you just bumped into it, unless the owner himself gave out the private key.

kojektea
Sr. Member
****
Offline Offline

Activity: 2254
Merit: 256


Vave.com - Crypto Casino


View Profile WWW
September 03, 2022, 06:18:36 AM
 #13

they as the developer of the smart contract or the audit team should be held accountable. some projects even give big bounties for all the bugs found usually done by the hackers themselves. i agree if it is wallet theft indeed it is a malicious hacker and it is a personal loss only. whereas if smart contracts are targeted then one project will fail.
Wapfika
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 562


Bitcoin makes the world go 🔃


View Profile
September 03, 2022, 06:24:03 AM
 #14

The main concern here is the method on how the hacker have access on the private key. I understand your point that private key is the only way to prove ownership but the problem is you can’t get access to someone private key without doing something shady directly to the original owner such as phishing to get the private key which makes this topic falls to an illegal. This point is valid if the original owner has a consent or give directly the ownership to other people. Most of the hacking in crypto is result on exploit or phishing which is an illegal method to get possession of others property.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
vv181
Legendary
*
Offline Offline

Activity: 1932
Merit: 1273


View Profile
September 03, 2022, 07:27:46 AM
 #15

Making the villains the super heroes right? Hacking is stealing don't make it look like it's great to be an hacker, the only way to be an hacker and be legal is getting paid trying to hack into projects security and that's after you've agreed to proceed with the team, bounty things you know.

But is it hacking if someone has access to your private keys?

Maybe let's define what is "hack" and what is "access" according to thefreedictionary.com

Quote
hack 1  (hăk)
v. hacked, hack·ing, hacks
v.tr.
b. To gain access to (a computer file or network) illegally or without authorization: hacked the firm's personnel database.

Quote
ac·cess  (ăk′sĕs)
n.
1. A means of approaching, entering, exiting, communicating with, or making use of: a store with easy access.
2. The ability or right to approach, enter, exit, communicate with, or make use of: has access to the restricted area; has access to classified material.

Based on that and your question, accessing my own private keys without any probable and reasonable legal authority or simply because of my own personal authorization can be concluded as hacking. I didn't give any permission to anyone to control any of my belonging, in any way, even if it was because of my own mistake, the private keys are illegally controlled, which it can be defined as hacking.

But can be a private key illegally controled? Do you own the coins or do you own a key to access the ledger? This is my question, remember the hack against the pancakeswap admin, maybe not the best example, but still

Yes, in a broader sense. But if we fixated our views toward "code is law' or simply how the system/blockchain and the consensus perceive the accessed private keys, then it is simply according to the rule, which is it's the way it is supposed to be and I think there is no way it can be claimed as hacking.

Can you name which of the Pancakeswap hack?


As an old computer geek, this is a common misconception and not any serious dictionary would define it like that. Hacker is a computer enthusiast and word hacking has been tainted by people who don't understand the whole scene and see computer experts as scary criminals just because they COULD use it to illegal purposes.

Word describing gaining access illegally should be Cracker, which is the word that was commonly used by "the scene" because they cracked systems for their own benefit or the benefit for others.

Exactly, the word hack is evolved not as what it was meant to be, just like "crypto". But in this case, I think we need to hold firm and give some direct examples of some definitions for the discussion.
icalical
Sr. Member
****
Offline Offline

Activity: 1372
Merit: 268


Graphic & Motion Designer


View Profile WWW
September 03, 2022, 12:45:57 PM
 #16

Well, if you said that and then we apply your statement to a conventional money, you cannot prove the ownership of your money either so how will you prove it if it's your money? but afterall stealing money is always illegal when you have enough evidence to prove that you owned that money before it was stolen. And in the case of crypto it is easier with Sign Message, you can show that you have done a signed message before the private key is stolen then it's enough evidence that your private key has been stolen. But then again, stealing crypto private key is actually far more difficult.

fiulpro
Hero Member
*****
Offline Offline

Activity: 1862
Merit: 830



View Profile
September 03, 2022, 03:40:59 PM
 #17

Let me tell you guys a story, a woman in her 60's was trying out her beautiful diamond ring that her husband gifted to her when they got engaged and now, as she sat down looking at that ring in the mirror, there was a slight knock at the window, she rushed to see that she left her door open, it was wind rustling through, when she came back she took the ring off and proceed to lock all the windows and doors since it was quite windy, when she came back, the ring was gone, she was able to evaluate by the CCTV footage, who stole that ring ?
She presented her servant to the court and asked for her ring back, now the servant said, " since I found it, it's mine "~
Did you get the moral of the story?
This is futile, it's like giving people the freedom to do wrong things.

▄▄▄███████▄▄▄
▄█████████████████▄▄
▄██
█████████▀██▀████████
████████▀
░░░░▀░░██████████
███████████▌░░▄▄▄░░░▀████████
███████
█████░░░███▌░░░█████████
███
████████░░░░░░░░░░▄█████████
█████████▀░░░▄████░░░░█████████
███
████▄▄░░░░▀▀▀░░░░▄████████
█████
███▌▄█░░▄▄▄▄█████████
▀████
██████▄██
██████████▀
▀▀█████████████████▀▀
▀▀▀███████▀▀
.
.BitcoinCleanUp.com.


















































.
.     Debunking Bitcoin's Energy Use     .
███████████████████████████████
███████████████████████████████
███████████████████████████████
███████▀█████████▀▀▀▀█▀████████
███████▌░▀▀████▀░░░░░░░▄███████
███████▀░░░░░░░░░░░░░░▐████████
████████▄░░░░░░░░░░░░░█████████
████████▄░░░░░░░░░░░▄██████████
███████▀▀▀░░░░░░░▄▄████████████
█████████▄▄▄▄▄▄████████████████
███████████████████████████████
███████████████████████████████
███████████████████████████████
...#EndTheFUD...
saxydev (OP)
Member
**
Offline Offline

Activity: 429
Merit: 52


View Profile WWW
September 05, 2022, 03:04:09 PM
 #18

example: https://blockchair.com/bitcoin/transaction/4e6f0e562e1309ff4fa17e0d87e9bdbadce924a16201e86807028cbed9dfb3b8
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!