| 1. | | Thank You HN: From 30 people whose lives you saved |
| 372 points by chaseadam17 on Nov 21, 2012 | 56 comments |
|
| 2. | | A Better Twitter Bootstrap Modal (github.com/jschr) |
| 358 points by dkroy on Nov 21, 2012 | 71 comments |
|
| 3. | | TL;DR β Faster News (toolong-didntread.com) |
| 287 points by swader on Nov 21, 2012 | 138 comments |
|
| 4. | | "Your criticisms are completely wrong": Stallman on software patents (arstechnica.com) |
| 274 points by markshepard on Nov 21, 2012 | 198 comments |
|
| 5. | | Elon Musk and the Hyperloop (jacquesmattheij.com) |
| 209 points by snippyhollow on Nov 21, 2012 | 190 comments |
|
| π. |
|
Strategy Letter V (joelonsoftware.com) |
|
11 min read | by Joel Spolsky | saved 159 days ago | archive
|
|
| 6. | | Everything Technical in F1 (scarbsf1.com) |
| 167 points by dmmalam on Nov 21, 2012 | 56 comments |
|
| 7. | | Extremist Programming (ezyang.com) |
| 167 points by achille on Nov 21, 2012 | 66 comments |
|
| 8. | | Scientist Creates Self-Filling Water Bottle (thenextweb.com) |
| 158 points by Vilvaram1 on Nov 21, 2012 | 55 comments |
|
| 9. | | On Being a Junior Developer (mattsencenbaugh.com) |
| 141 points by msencenb on Nov 21, 2012 | 71 comments |
|
| |
|
|
| π. |
|
From Philosophy to Power: (salmagundi.skidmore.edu) |
|
59 min read | by Paul Leslie | saved 286 days ago | 55% read | archive
|
|
| 11. | | Samsung's A15 Chromebook Loaded With Ubuntu Is Crazy Fast (phoronix.com) |
| 133 points by mtgx on Nov 21, 2012 | 94 comments |
|
| |
|
|
| 13. | | Ask HN: How have you made "quick" money before? |
| 125 points by throwaway_broke on Nov 21, 2012 | 101 comments |
|
| 14. | | Interactive Data Visualization for the Web (a D3 book by Scott Murray) (oreilly.com) |
| 121 points by mxfh on Nov 21, 2012 | 16 comments |
|
| 15. | | Rootkit infects Linux web servers (h-online.com) |
| 110 points by tangue on Nov 21, 2012 | 28 comments |
|
| π. |
|
Kalshi Found Some Insider Traders (archive.is) |
|
18 min read | by Matt Levine | saved 1 day ago | archive
|
|
| 16. | | Calling All Broadcasters (bittorrent.com) |
| 118 points by marioestrada on Nov 21, 2012 | 48 comments |
|
| 17. | | Why tiny Stockholm has the most stunning startup ecosystem since Tel Aviv (pandodaily.com) |
| 105 points by siavash on Nov 21, 2012 | 97 comments |
|
| 18. | | Megaupload Assisted FBI vs NinjaVideo, But Evidence Then Used Against Them (torrentfreak.com) |
| 96 points by AlexanderHektor on Nov 21, 2012 | 51 comments |
|
| 19. | | The problem with a Lean Startup: the Minimum Viable Product. (paulkortman.com) |
| 93 points by vital101 on Nov 21, 2012 | 58 comments |
|
| 20. | | A Tale of Two Bridges (unprotocols.org) |
| 83 points by raldi on Nov 21, 2012 | 47 comments |
|
| π. |
|
Tech venture firms deploy private equity βroll-upβ strategy (archive.ph) |
|
3 min read | by archive.ph | saved 207 days ago | archive
|
|
| 21. | | Flatiron, A framework for Node.js (flatironjs.org) |
| 82 points by wamatt on Nov 21, 2012 | 13 comments |
|
| 22. | | CardMunch CEO uses Flightfox for 29-Country Startup Trip (flightfox.com) |
| 85 points by todsul on Nov 21, 2012 | 31 comments |
|
| 23. | | Jury convicts NY man accused of AT&T-iPad hacking (yahoo.com) |
| 75 points by meifun on Nov 21, 2012 | 80 comments |
|
| 24. | | What Every Computer Scientist Should Know About Floating-Point Arithmetic (oracle.com) |
| 74 points by hamidr on Nov 21, 2012 | 39 comments |
|
| 25. | | The maker/manager transition phase (joel.is) |
| 72 points by LeonW on Nov 21, 2012 | 10 comments |
|
| π. |
|
Bookshelf (calv.info) |
|
1 min read | by calv.info | saved 229 days ago | archive
|
|
| 26. | | Trotify: make your bicycle sound like a horse [video] (trotify.com) |
| 69 points by jgrahamc on Nov 21, 2012 | 70 comments |
|
| 27. | | Homeland Security spent $430M on radios its employees donβt know how to use (arstechnica.com) |
| 66 points by Cbasedlifeform on Nov 21, 2012 | 45 comments |
|
| 28. | | Show HN: Say Cheese - a cross-browser compatible webcam API (leemachin.github.com) |
| 66 points by FuzzyDunlop on Nov 21, 2012 | 15 comments |
|
| 29. | | Prince William photos accidentally reveal RAF password (sophos.com) |
| 63 points by Garbage on Nov 21, 2012 | 46 comments |
|
| |
|
|
| π. |
|
Ralph Wiggum as a "software engineer" (ghuntley.com) |
|
20 min read | by Geoffrey Huntley | saved 236 days ago | archive
|
|
|
| More |
The opinion is not only compelling, it is a brilliant example of law at its best, for it shows how a wonderful legal mind wrestles with a knotty problem that can be summed up with the question, "Should courts apply a badly drafted piece of legislation to lead to the absurd result of criminalizing a whole host of minor misdeeds committed by individuals every day in using the web and their computers?" Judge Kozinski answered this question with a resounding "no."
He did so by applying the "rule of lenity," which requires "penal laws . . . to be construed strictly." (at p. 3872) "The rule of lenity not only ensures that citizens will have fair notice of the criminal laws, but also that Congress will have fair notice of what conduct its laws criminalize. We construe criminal statutes narrowly so that Congress will not unintentionally turn ordinary citizens into criminals." Applying this rule, he held as follows: "Therefore, we hold that 'exceeds authorized access' in the CFAA is limited to violations of restrictions on access to information, and not restrictions on its use." (emphasis in original)
In other words, though the CFAA is so badly worded that one might potentially give it an absurd and unconstitutional interpretation so as to criminalize things one would think shocking for Congress to have criminalized, the courts have the power to apply well-established rules of statutory construction so as to avoid such an absurdity. Here, the Ninth Circuit did so by construing the CFAA to criminalize violations of access restrictions (i.e., hacking) and not violations of use restrictions (terms of use on website and the like).
Now, there is a split in the federal circuits on this issue and it will either be resolved by an amendment to the statute or it will eventually find its way to the Supreme Court for resolution. But, even granting the split, the most extreme cases in which the CFAA has been applied criminally have involved things such as employees misappropriating trade secrets and other items that go far beyond innocuous things such as violating an employer's computer use policies by surfing the internet on company time.
In other words, no court has gone so far as to adopt anything close to the absurd outcomes suggested in this piece. Even the government in its arguments to Judge Kozinski strongly stated that it would never consider prosecuting such items as crimes. ("The government assures us that, whatever the scope of the CFAA, it won't prosecute minor violations. But we shouldn't have to live at the mercy of the local prosecutor." at p. 3870)
Thus, it is fit and proper to call out the alarmist tone of this piece as being wildly outside the mainstream of where the courts have gone with the CFAA and of where they are likely to go. Is it badly drafted legislation? Yes, it is a mess (if you want to lose your mind, try reading through the text of the statute here: http://www.law.cornell.edu/uscode/text/18/1030). Can it be interpreted to criminalize things that Congress might not have intended to criminalize? Yes, including acts by employees that, though wrongful, may not have been within the contemplation of Congress when it passed the statute. But, that said, is there a risk that the CFAA can be applied to criminalize our daily interaction with computers and the web? No, not unless normal, sound principles of law are wholly disregarded by the courts, which they won't be.