"What's good fam? I've been thinking a lot about the lines we draw in the hacking world - where does 'white hat' end and 'gray hat' begin? In my opinion, finding and reporting vulnerabilities is a crucial part of keeping the internet secure, but where do we draw the line when exploiting them to test our own security measures?"