Home » Is it legal to hack a website that distribute my copyrighted materials? [closed]

Is it legal to hack a website that distribute my copyrighted materials? [closed]

Solutons:


No, self-retaliation is not legal. I am not a lawyer or entitled to give law-related advice in any jurisdiction whatsoever; but I bet such punitive action is explicitly forbidden by the laws of the country you live in (at least). Generically, if you refer to the usual typology of societies as defined by Elman Service, in societies which have reach the “chiefdom” or “state” levels, violence (and thus its corollary, justice) becomes a monopoly of the society’s leader and his delegates.

One way to deter people from putting up bought PDF on free download platforms is to tag the PDF with the user name. That’s what ANSI does (I have bought a copy of the X9.62 standard, and the PDF I got bears my name in the margin of each page). A motivated attacker may edit the PDF files to remove this kind of tag, but that would suspiciously look like work, and attackers, being also humans, are inherently lazy. This ought to make your problem less frequent.

Acting on one illegal act with another illegal act does not make any of the two legal. In fact, you might effectively prevent any legal action against the perpetrator of the former, if your latter illegal act in vengeance (whatever it might be) rendered any evidence gathered against the former useless, or even illegal, depending on how it was obtained and if it’s possible for the perpetrator of the former to dispute their legality. His act would still not be legal, but it might be impossible to prosecute. I’d be extremely wary of how you thread, and what action you deem ethical in the legal corridors.

Disclaimer: I am not a lawyer

No. Just like it’s illegal to hunt down and kill a thief, it’s illegal to retaliate in most countries, and you would be in just as much trouble as in the case where you hack some random website that you have no grudge against.

Instead, in the case of the pdfs being posted on a file hosting service (which are usually DMCA safe harbors), file a DMCA takedown request for that file. If the host isn’t classified as a safe harbor, you can sue.


In the future, try using DRM.

Related Solutions

How to delete a non-empty directory in Terminal?

Use the below command : rm -rf lampp It deletes all files and folders contained in the lampp directory. In case user doesn't have the permission to delete the folder: Add sudo at the beginning of the command : sudo rm -rf folderName Otherwise, without sudo you...

mysql: Show GRANTs for all users

Nothing built-in. You have two options though: Use common_schema's sql_show_grants view. For example, you can query: SELECT sql_grants FROM common_schema.sql_show_grants; Or you can query for particular users, for example: SELECT sql_grants FROM...

Configurable values to MDB annotations

You can externalise the annotations into the ejb-jar.xml that you deploy in the META-INF of your jar file as follows: <?xml version="1.0" encoding="UTF-8"?> <ejb-jar version="3.0"> <enterprise-beans> <message-driven>...

How do I select which Apache MPM to use?

There are a number of MPM modules (Multi-Processing Modules), but by far the most widely used (at least on *nix platforms) are the three main ones: prefork, worker, and event. Essentially, they represent the evolution of the Apache web server, and the different...

Using var self = this or .bind(this)? [closed]

Things that would favor var self = this; bind isn't supported in IE8 and Safari5. If you aim to build a library or code that supports legacy browsers, then var self = this would be more cross-browser friendly. Sometimes, callbacks are bound to a certain context...

What is the difference between SSL vs SSH? Which is more secure?

SSL and SSH both provide the cryptographic elements to build a tunnel for confidential data transport with checked integrity. For that part, they use similar techniques, and may suffer from the same kind of attacks, so they should provide similar security (i.e....

How can I stop applications and services from running?

First Things First You may have some misconceptions about how Android works and what's really happening when a service is running or an app is in the background. See also: Do I really need to install a task manager? Most apps (e.g., ones you launch manually)...

How do I reset a lost administrative password?

By default the first user's account is an administrative account, so if the UI is prompting you for a password it's probably that person's user password. If the user doesn't remember their password you need to reset it. To do this you need to boot into recovery...

How can I use environment variables in Nginx.conf

From the official Nginx docker file: Using environment variables in nginx configuration: Out-of-the-box, Nginx doesn't support using environment variables inside most configuration blocks. But envsubst may be used as a workaround if you need to generate your...

Difference between .bashrc and .bash_profile

Traditionally, when you log into a Unix system, the system would start one program for you. That program is a shell, i.e., a program designed to start other programs. It's a command line shell: you start another program by typing its name. The default shell, a...

Custom query with Castle ActiveRecord

In this case what you want is HqlBasedQuery. Your query will be a projection, so what you'll get back will be an ArrayList of tuples containing the results (the content of each element of the ArrayList will depend on the query, but for more than one value will...

What is the “You have new mail” message in Linux/UNIX?

Where is this mail? It's likely to be in the spool file: /var/mail/$USER or /var/spool/mail/$USER are the most common locations on Linux and BSD. (Other locations are possible – check if $MAIL is set – but by default, the system only informs you about...

How can I find the implementations of Linux kernel system calls?

System calls aren't handled like regular function calls. It takes special code to make the transition from user space to kernel space, basically a bit of inline assembly code injected into your program at the call site. The kernel side code that "catches" the...

Is a composite index also good for queries on the first field?

It certainly is. We discussed that in great detail under this related question: Working of indexes in PostgreSQL Space is allocated in multiples of MAXALIGN, which is typically 8 bytes on a 64-bit OS or (much less common) 4 bytes on a 32-bit OS. If you are not...