Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Interesting. I'll have to take a look at that.

I've heard of much of this kind of behavior before. Doesn't this generally involve some form of entrapment, rather than mere browsing behavior?

Important to consider, regardless.



the book argues, quite successfully in my opinion, that these cases are entrapment. The government says that entrapment doesn't apply because terrorism.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: