@fedops @floort It seems like one of the parties here was a Belgian organisation, so the law certainly can apply.
Whether or not such a law is enforceable is another thing (and might depend on e.g. mutual or multilateral treaties between the countries involved).
And, as Inti said, the question is also whether or not there ever was a crime committed.
@floort AFAICT the law & permission from CCB is only relevant when you need protection for violating the law, and not when you accidentally stumble onto something.
E.g. actively bypassing authentication in unintended ways vs. finding that someone accidentally exposed a document by checking the wrong option in a CMS.
Itβs the difference between reporting that you found a way to open a car (e.g. with a replay attack), and reporting that someone left their car door open.
@floort IANAL but when reading the law , it seems like after you reported it, CCB is *required by law* to *facilitate* (e.g. negotiate on your behalf) the responsible *disclosure*, and thus refusing that (after the security issue is fixed) would mean *they* violate the law regulating their existence?
Maybe @intidc knows a lawyer who can help explain thisβ¦
@fedops Well, obviously any country can and does have such laws. It doesnβt matter who you are or where in the world you are, if you hack into a server located in Belgium this act falls under Belgian jurisdiction. And the baseline here is: itβs an act punishable by law.
Now reasonable laws should have exceptions for security research. At the very least, anything thatβs on your computer should be considered fair game for security research (yes, I am aware that this isnβt always true either).
When it comes to remote systems, things get really complicated however. Theory: any βnormalβ use of the system (whatever a regular user could do) should be an exception. But even that is hard to define, and lawmakers regularly fail there.
And for anything beyond that, you normally need a permission by the owner of the system. Which regularly comes with limitations on your disclosure options. Because otherwise you operate within a grey area β this kind of security research is rarely persecuted unless actual damage has been done, but it still could be.
Now whether it is wise to put strict reporting obligations on the researcher as opposed to the affected organization is an entirely different matter. As it is, this law will be broken quite regularly. And Belgium will usually just accept that, because thatβs the only reasonable course of action. As opposed to persecuting well-meaning individuals for their lack of knowledge, despite them not having done any real harm.
@floort Yep, thatβs what I understood. Itβs something that should fall under βnormalβ use of a system. Still, this being a remote system things are complicated unfortunately and depend on the jurisdiction - if you choose not to ignore the potentially applicable laws. Itβs not like these laws are likely to be applied, but in theory they could be. Usually the only scenario where such laws are ever pulled out is when the affected organization decides to play the victim and blame you. Itβs very rare but it happens.
TLDR: It depends. People who discover bugs and security vulnerabilities and want to improve security by publishing about their findings generally have a substantial task managing competing interests in the process. Publishing your findings can help others learn from that single mistake by installing a known patch, learning what mistakes not to make when building systems, knowing what vendors to avoid or taking other measures. However publishing can also introduce risks by informing people how to abuse vulnerabilities. Itβs generally considered good practice to inform those who you know are vulnerable before publication to allow them to take steps to prevent harm. That process can be more time consuming than finding the bugs themselves and can even present a risk for the one reporting the bugs, for example by companies threatening legal action.