You must log in or register to comment.
How is this not already illegal similar to DDoS?
Or just under the unauthorized access provision of the computer fraud and abuse act since they’re directly evading access controls.
How is this not already illegal similar to DDoS?
Or just under the unauthorized access provision of the computer fraud and abuse act since they’re directly evading access controls.