Is it illegal to post tutorials and articles on hacking related things? In particular in the UK.
For example would it be illegal under this law? http://www.legislation.gov.uk/ukpga/1990/18/section/3A
Is it illegal to post tutorials and articles on hacking related things? In particular in the UK.
For example would it be illegal under this law? http://www.legislation.gov.uk/ukpga/1990/18/section/3A
This is an area where you would be best consulting a lawyer for a definitive answer. We can expound on this topic to our hearts content (and I have chosen to do so below) but don't just believe us.
My reading of the Computer Misuse Act is that it does seem to prohibit writing about specific means that can be used to break into a specific computer system. In fact, it is almost certainly this provision which can be used to prosecute those who write malicious software (viruses, worms etc.). However, keep in mind that the Human Rights Act also protects your right to free speech. Which act takes precedent in a certain situation is something a lawyer can explain better than anyone on this site. I would suggest that a document detailing facts is more akin to distributing knowledge and therefore protected by free speech legislation (I'm happy to hear other suggestions).
A lawyer conversant with such things would be able to explain what is meant by "article" in this context. You obviously mean a document stating how to carry out certain procedures (i.e. how to do a port scan) whereas that provision of the act appears to me to be talking as much about programmes or data (for example tailored exploit code or a virus).
It would be analogous to being caught carrying a flick knife or lock picks. They have a specific use, and mostly used for committing crimes (though someone has told me before carrying lock picks is a grey area; IANAL). If you wrote an article "The steps you need to bypass company 's security measures and access their secret database MWAHAHAHA" then you are almost certainly breaking the law. However, an article which merely specified how nmap works in general wouldn't be an issue.