pull down to refresh
54 sats \ 19 replies \ @Cje95 24 Apr \ parent \ on: Samourai Indictment Count Two Could Have Serious Implications For All Wallets bitcoin
To add to that its also not like this is malicious code! If this was code that purposefully did some shady stuff then I can at least see what the government is getting at. This isn't that so I fail to grasp the logic.
Code is speech. They don't get an exception by calling it malicious under any circumstances, IMO.
reply
You can't imagine any code that violates free speech? All code, no matter what it does, absolves its creators of culpability? If I created a virus that wrecked the power of a city, resulting in the death of thousands? That's free speech?
reply
Uh, in that case the damage was done because the city executed the code. Code by itself can't do anything to you unless you run it. Keeping your systems secure is on you.
reply
Here's another version to better suit your position. Person A drugs you, but person B asks you to go to the ATM, empty it out, and give them all the money. Did person B do anything wrong?
reply
Morally wrong, sure. But legally? Person A committed the crime. One is an act of violence, the other is not.
reply
Can we put aside the mixing aspect and focus on count two? You creating a virus would subject you to criminal liability. It's your act that made it criminal. Let's say you made that virus for a white hat defense?
reply
I'm happy to consider those two things separately, but I think the implication is that some code violates private property.
reply
I didn't go through it carefully, but I think this article sums up the law regarding code as speech pretty well:
https://www.pbs.org/wgbh/nova/article/is-code-free-speech/
In the 1990s, the Electronic Frontier Foundation—which, at the time, was a fairly new organization—took on a series of cases on behalf of a cryptographer named Daniel Bernstein, who argued that he had a right to make public certain cryptographic programs that he’d created. Bernstein wanted to publish an algorithm, a mathematical paper that explained the algorithm, and the source code for a computer program that incorporated it. But the government required Bernstein to apply for a license to do all of this— and to submit his ideas for federal review.
Bernstein sued and eventually won the case. Software source code was deemed speech protected by the First Amendment.
reply
I don't think bernstein was charged for using the code, but for publishing it.
reply
reply
deleted by author
reply
reply
True, but in the case of code, the exceptions aren't inherent -- someone would have to use the code to commit a crime, so it's the action, not the code, that's illegal.
(IANAL, just someone who reads a fuckton and listens to tons of Darknet Diaries, so happy to be corrected.)
reply
I'm not 110% certain of this but I would find it odd that if you create code that flips off temp regulation in a computer and then give it the ability to adapt and spread on its own that that code itself would be a violation if that makes sense. The code itself might be the one spreading itself but the creator or the code itself would seem to be a violation of freedom of speech since it is harmful
reply
nod As I noted, I'm not a lawyer (have taken a bunch of infosec classes towards a Master's degree, but that's more focused on tactics than legality), and I'd imagine there is a line at which it would not be speech (though I'm not sure Samurai would fit that bill). And once it's operating as a worm, that's definitely different (as running the application is inherently an attack). Though it's running the code, not writing or possessing it, that would be the issue here.
Also, the cynical side of me wonders why the government hasn't looked at mining software as something that overheats computers dangerously.
reply
I get your point, but keep in mind that defamation and fraud are usually civil, not criminal, and I can't see the threat analogy applied to software.
Even shady software can have uses -- the same software a hacker might use to get into a system is used by pen testers and white hat hackers to test and secure those same systems. Code is neutral.
reply
I was using the idea of shady stuff as at least some way to look at some code that for instance turns off a computer's fan to force it to overheat... I would call that shady because while someone could be using it to increase cybersecurity the likelihood would be much more negative hence my reasoning.
reply