Editing Talk:1494: Insurance
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 33: | Line 33: | ||
:Agree, this is excellent example on "hacking the computer": there is nothing illegal on lock-picking itself. Even if you use it on someone's else door without permission, it would not be crime unless you actually ENTER the door (or damage the lock). Locksmiths MUST know how to do it. But ... first thing you think about when hearing lock-picking is that thiefs do it. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 11:37, 4 March 2015 (UTC) | :Agree, this is excellent example on "hacking the computer": there is nothing illegal on lock-picking itself. Even if you use it on someone's else door without permission, it would not be crime unless you actually ENTER the door (or damage the lock). Locksmiths MUST know how to do it. But ... first thing you think about when hearing lock-picking is that thiefs do it. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 11:37, 4 March 2015 (UTC) | ||
β | + | ||
I think part of the point of today's comic is to point that contracts are somewhat similar to a computer program (both have definitions and rules by which the system must abide), but lack the strict rigor of the latter. So, when programmers read a legal contract they immediately start searching for bugs or vulnerabilities or even syntax optimizations. {{unsigned ip|188.114.98.29}} | I think part of the point of today's comic is to point that contracts are somewhat similar to a computer program (both have definitions and rules by which the system must abide), but lack the strict rigor of the latter. So, when programmers read a legal contract they immediately start searching for bugs or vulnerabilities or even syntax optimizations. {{unsigned ip|188.114.98.29}} |