Editing 1494: Insurance
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 8: | Line 8: | ||
==Explanation== | ==Explanation== | ||
− | [[Cueball]], | + | [[Cueball]] in this comic, as is often the case, is some sort of programmer or at least logically minded person. He reads through the terms that are handed to him, and finds some sort of loophole. This is a play on the fact that programmers often find loopholes in programs and code, and exploiting them is nothing more than a "cool find" or an interesting idea. More importantly, programmers try to prevent loopholes, which is why it is important to be able to identify them. |
− | + | The insurance agent foresees this, and explains that this {{w|Life hacking|"cool hack"}} is actually just an instance of {{w|insurance fraud}}, which is highly illegal. The comparison here is that exploiting a program's faults can be regarded as interesting or fun, while exploiting the faults in a legal document will often result in some sort of legal repercussions (however, sometimes legal {{w|loophole|loopholes}} are exploited by individuals or corporations in ways that are not illegal). | |
− | + | The insurance agent is also already prepared for the following question - how he knew Cueball would be looking for loopholes, and it's because many programmers visit him. | |
− | The | + | The title text provides another example: While airport luggage security certainly is exploitable, walking out with ''every'' piece of luggage from the conveyor belt would be easily noticeable and would result in being arrested for theft. |
− | + | This relates to [[1469: UV]] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | [[1469: UV]] | ||
==Lifehacks vs. IT hacks== | ==Lifehacks vs. IT hacks== | ||
− | The term hacking in IT is ambiguous and goes from code development (in particular in the opensource community) to the fact of "using a {{w|Hack|hack}}". A hack would then refer to a tricky piece of code doing the intended job in a way that the framework or project in which it is inserted was not intended to. To the general public, 'hacking' a system would normally refer to some illegal way of | + | The term hacking in IT is ambiguous and goes from code development (in particular in the opensource community) to the fact of "using a {{w|Hack|hack}}". A hack would then refer to a tricky piece of code doing the intended job in a way that the framework or project in which it is inserted was not intended to. To the general public, 'hacking' a system would normally refer to some illegal way of acheiving a goal against the will of the original developers of the system, like getting a copy of all the data available or taking advantage of some unwanted behavior, but a more distinctive term for such an exploitation (maliciously or after an invitation to perform legitimate penetration testing) would be 'cracking'. |
This comic is making fun of what IT hacks would look like in real world. Surely, taking lots of luggage from an airport is technically possible and probably not so difficult, but first, it looks weird, and second, it's also obviously illegal. The weirdness of such behavior is more obvious in real life than in IT. | This comic is making fun of what IT hacks would look like in real world. Surely, taking lots of luggage from an airport is technically possible and probably not so difficult, but first, it looks weird, and second, it's also obviously illegal. The weirdness of such behavior is more obvious in real life than in IT. | ||
Line 47: | Line 39: | ||
{{comic discussion}} | {{comic discussion}} | ||
[[Category:Comics featuring Cueball]] | [[Category:Comics featuring Cueball]] | ||
− |