You own your computer, so surely, nobody has the right to use your property without your permission, right? On the other hand, all a hacker can do (remotely, anyway) is ask your computer to provide it with information, your computer either says yes, or no. If all a hacker can do is ask your computer…...