|This page has been transwikied to Wiktionary.
The article has content that is useful at Wiktionary. Therefore the article can be found at either here or here (logs 1 logs 2.)
Note: This means that the article has been copied to the Wiktionary Transwiki namespace for evaluation and formatting. It does not mean that the article is in the Wiktionary main namespace, or that it has been removed from Wikipedia's. Furthermore, the Wiktionarians might delete the article from Wiktionary if they do not find it to be appropriate for the Wiktionary.
Removing this tag will usually trigger CopyToWiktionaryBot to re-transwiki the entry. This article should have been removed from Category:Copy to Wiktionary and should not be re-added there.
|WikiProject Computing||(Rated Start-class)|
|WikiProject Computer Security / Computing||(Rated Start-class, Mid-importance)|
The section on the defacement of anti-piracy.se seems particularly confusing; I'm assuming it's a bad translation. Perhaps someone who knows about this incident could clean it up. Smably 16:23, 9 April 2006 (UTC)
- Done. If you still find it confusing, feel free to add the Confusing-tag again. I've cleaned it up into a state which I belive most people should be able to understand. --Ojan 15:00, 14 May 2006 (UTC)
I am tempted to add a confusing tag, "considered black but the action was grey" hrmm. I query if this whole section should be removed. It doesn't aid explanation in my opinion, the apache hack is far clearer. Znx 09:28, 11 May 2007 (UTC)
Also, I don't see the need to put the current website of the anti-piracy group. It doesn't add anything to the article, and seems to be a subtle suggestion to repeat the incident. endercoaster 13:39 CT, 18 Oct 2007 —Preceding unsigned comment added by 220.127.116.11 (talk) 18:40, 18 October 2007 (UTC)
Attacking corporate businesses with unethical practices could be regarded as highly unethical and would normally be considered black hat activity. However, to a grey hat, it may not appear bad even though it is against that local law. So instead of tagging it black hat, it is a grey hat hack.
I removed the above line because it was nonspecific about what it deemed to be unethical practices. This made it seem to define entirely black hat activities. I also expounded on some aspects and added an example. -- Kerowren (talk • contribs • ) 18:24, 20 December 2006 (UTC)
not white hats?
the example sounds like a white hat attack. —Preceding unsigned comment added by 18.104.22.168 (talk) 21:24, 15 November 2008 (UTC) The difference is that the hackers did not have permission to infiltrate the server. Nave.notnilc (talk) 22:56, 17 December 2008 (UTC)
"Sometimes acts legally"?
I may be misunderstanding, but based on the information in the "Disambiguation" section, it seems like that part of the opening sentence should read "sometimes acts illegally".Dindon (talk) 20:38, 23 February 2009 (UTC)
History of the Term
Given the ridiculous usage of the term 'grey hat' in other wikipedia entries that link to here, I felt it necessary to clean this article up.
I kid you not, in one part of wikipedia someone had mentioned that a gray hat is a hacker who searches the internet, breaking into computers so that he might patch them anonymously for free, thus saving the day. While I do not doubt that in this great big world there are at least a few insane 'hacker messiahs' who run around the internet secretly healing computers all day long, this is not normal behaviour for security analysts.
What I have done is outline the history of the usage of the term. Using references of prominent works, I have shown that the term 'grey hat' has had a varied meaning from the start. If we deconstruct this whole hat debate, we can see that there are two elements to consider:
- that attacking a computer can be malicious or non-malicious
- when finding a vulnerability the hacker can not disclose, disclose to the vendor, or disclose to everyone
Traditionally there was blackhat and whitehat (malicious and non-malicious) Then we got the Anti-Sec Revolution, and some whitehats began re-thinking their position on full disclosure because it was arming script kiddies for battle. As a result, if we are talking about 3 kinds of hats then we differentiate them by disclosure. If it were just white and black then it would be intent...
|Black Hat||White Hat||Grey Hat|
|Disclosure||No one||Everyone||Vendor Only|
- From the black hat perspective, the grey hat is still an enemy because they seek to fix vulnerabilities rather than exploit them.
- From the white hat perspective, the grey hat is distrusted because they are not engaging in full disclosure and may break the law sometimes, but they are still an ally because their intent is good.
They always reveal only to vendors?
I thought the black-gray-white thing was more like evil-neutral-good. Black acting to harm others, gray acting on their own interests and white to benefit others; with decisions regarding disclosure being done on a case by case basis, or based on personal phylosophy, regardless of one's alignment... --TiagoTiago (talk) 17:14, 22 August 2011 (UTC)
Remove company name from history section?
The history section opens with a reference to a computer security company (of the white hat variety as they solicit permission and payment in advance of vulnerability testing) which chose a contraction of the phrase "grey hat" to name their company Greyhat, LLC. The contraction is not the same as the phrase this article addresses and is not relevant to the history of the phrase "grey hat" in the computer security content of this article. Allowing that this removal creates a substantial hole in the history section, I have documentation supporting an accurate history of the phrase publicly used as early as 1996 and other documented examples in succeeding years. I will replace the deleted material with these fully referenced additions. Absent objection, I will make these changes during the next ten days. Thank you. Sonora Carlos (talk) 18:31, 31 March 2015 (UTC)
"Grey Hat" used in infosec context in 1976
Martin Hellman's page has a link to John Gilmore's transcript of the 1976 meeting between Diffie, Hellman, and three NSA staffers  - starting at about 28m22s in the conversation, Doug Hogan of the NSA uses the terms "Black Hat", "White Hat", and "Grey Hat". —Hobart (talk) 05:47, 10 July 2016 (UTC)
Hello fellow Wikipedians,
I have just modified one external link on Grey hat. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20100612222852/http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed to http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
You may set the
|checked=, on this template, to true or failed to let other editors know you reviewed the change. If you find any errors, please use the tools below to fix them or call an editor by setting
|needhelp= to your help request.
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
If you are unable to use these tools, you may set
|needhelp=<your help request> on this template to request help from an experienced user. Please include details about your problem, to help other editors.