Don wrote: Rebel wrote:1. I think every programmer knows what RE is, disassembling the executable of a competitor and then hunting for its secrets.
That is a very narrow definition. Here is a much more accurate and reasonable from the wikipedia. I want you to realize that I'm not being picky or petty about a specific definition because it's critical to the entire argument in my opinion. If it's not addressed it will come up anyway sooner or later.
From the wikipedia:
Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation.[1] It often involves taking something (e.g., a mechanical device, electronic component, software program, or biological, chemical, or organic matter) apart and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without using or simply duplicating (without understanding) the original.
The page you refer also states this:
wiki wrote:
European UnionArticle 6 of the 1991 EU Computer Programs Directive allows reverse engineering for the purposes of interoperability, but prohibits it for the purposes of creating a competing product, and also prohibits the public release of information obtained through reverse engineering of software.[24][25][26]
In 2009, the EU Computer Program Directive was superseded and the directive now states:[27]
(15) The unauthorised reproduction, translation, adaptation or transformation of the form of the code in which a copy of a computer program has been made available constitutes an infringement of the exclusive rights of the author.
Nevertheless, circumstances may exist when such a reproduction of the code and translation of its form are indispensable to obtain the necessary information to achieve the interoperability of an independently created program with other programs. It has therefore to be considered that, in these limited circumstances only, performance of the acts of reproduction and translation by or on behalf of a person having a right to use a copy of the program is legitimate and compatible with fair practice and must therefore be deemed not to require the authorisation of the rightholder.
An objective of this exception is to make it possible to connect all components of a computer system, including those of different manufacturers, so that they can work together. Such an exception to the author's exclusive rights may not be used in a way which prejudices the legitimate interests of the rightholder or which conflicts with a normal exploitation of the program.
I know that US law is different but not far behind the EU. As it goes with new developments things first need to go out of hand before the arisen problem gets the attention it needs from law-makers, on average laws come 5-10-15 years too late.
I expect US will catch up because basically RE is hacking. And there is inequality. Hacking Komodo hardly is a risk but don't try it to the FBI and rightly so.
The EU has chosen to protect the creativity of its citizens by making RE (with the intend to profit) a punishable crime and IMO rightly so.
In my days I knew that some where after mine and it felt like someone is breaking into your house and rob your valuable things. I think if Komodo were a target (and it probably is) you would feel the same.
And as a side note, not related to you, but because I can't resist the temptation

I would like to hear the opinion of the IGCA (headquarter London) on the matter of hacking and if that's acceptable for them.