Hacker News new | past | comments | ask | show | jobs | submit login

Which part of that long list of things specifically rules out possession of nmap, a tool used by sysadmins all over the world to help ensure that their own systems are more secure, by ensuring that only specific ports are open for communication?

Mapping a network is not an activity exclusive to criminals.




Dual use tools are not exempt. If it can be used for nefarious haxxoring then you’re out of luck. Let alone having something like msf on your box…


Everything can be dual use for "haxxoring".


Cyber laws are not known for being reasonable.

Though, this particular interpretation does make Google Chrome illegal; it has dev tools that can be used for manually sending HTTPS POST requests with forged headers. (It also has XMLHttpRequest, which can be instructed to do what nmap does with relative ease.)




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: