Hacker News new | past | comments | ask | show | jobs | submit login

If team A uses the binary to write a spec, and team B uses the spec to re-implement without direct help from team A, it's generally considered legit.

This was the method used by Compaq to implement the IBM BIOS, back in the day.




Yes, and we agree that team A's work needs to be done before team B can work. A's work is exactly what this DMCA notification tries to shut down.


> A's work is exactly what this DMCA notification tries to shut down.

What part of A's work involves distributing deobfuscated binaries to the general public?

Team B should only have access to the specifications developed by Team A and nothing else from them. That's the whole point of isolating them.


Yup, I'm with you. I don't think anyone's done anything like that for Skype, though.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: