Hacker News new | past | comments | ask | show | jobs | submit login

Maybe it could count as "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value".[0]

But they only bring out that kind of prosecutorial initiative and creativity, if you downloaded a bunch of academic articles after previously identifying yourself as a bit of a troublemaker (Aaron Swartz). Who cares about some old immigrant's restaurant? OK, enough cynicism for today..

[0] http://www.law.cornell.edu/uscode/text/18/1030




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: