Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

No disagreement there. Mathnerd314 asked for proof of stolen code, which of course is difficult to provide when we're talking about a closed source product. So the original authors must resort to indirect proof like comparing visuals and inspecting the binary.


view as:

Legal | privacy