Hacker News new | past | comments | ask | show | jobs | submit login

Based on your quote, with no other context, using your authentication to access information you aren’t supposed to access is verbatim the scenario the law speaks to.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: