top of page

Responsible Use
&
Ethical Hacking Policy

Purpose & Scope

Products by The Wired Hatters are intended solely for ethical security research, education, and testing on systems, hardware, or networks owned by the user or for which the user has explicit authorization.

We do not support, promote, or tolerate any illegal or unethical use of our products.

​

Permitted Use

Our products may be used for:

  • Authorized security research and penetration testing

  • Educational and training environments

  • Development, analysis, and testing of your own hardware and firmware

  • Validation and improvement of existing security measures

​

Prohibited Use

Use of our products is strictly prohibited for:

  • Unauthorized access to third-party systems or networks

  • Illegal interception, recording, or manipulation of data or communications

  • Circumvention of security mechanisms without permission

  • Any activity that violates applicable laws or regulations, including but not limited to
    German Criminal Code §§ 202a–202c and the U.S. Computer Fraud and Abuse Act (CFAA, 18 U.S.C. §1030)

​

Abuse Prevention & Product Design

To minimize misuse:

  • All modules and devices are shipped without preinstalled firmware

  • No functional firmware, attack code, testing software, or automated behavior is preloaded

  • Devices contain no illegal payloads and no one-click attack features

  • Documentation and support focus on hardware, firmware, and security concepts — not unlawful exploitation

  • We do not provide assistance for illegal activities

  • Transparency and auditability of functionality are prioritized

​

Orders, Support & Enforcement

The Wired Hatters reserves the right to:

  • Refuse, cancel, or refund orders where misuse is suspected

  • Deny or terminate support if unethical or illegal use is indicated

  • Cooperate with lawful requests from authorities when legally required

​

Legal Notice

Customers are solely responsible for ensuring lawful use of our products and compliance with all applicable laws, including international regulations such as the Computer Fraud and Abuse Act (CFAA).

bottom of page