Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Having the source leaked can be leveraged as a hindrance to third parties.

While it's closed source any coincidentally similar code is just that, a coincidence.

When it's out in the open coincidence becomes a potential denial of progress attack. How would you prove without doubt that something with clean-room created? Sounds time consuming and costly.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: