Having the source leaked can be leveraged as a hindrance to third parties.
While it's closed source any coincidentally similar code is just that, a coincidence.
When it's out in the open coincidence becomes a potential denial of progress attack. How would you prove without doubt that something with clean-room created? Sounds time consuming and costly.
While it's closed source any coincidentally similar code is just that, a coincidence.
When it's out in the open coincidence becomes a potential denial of progress attack. How would you prove without doubt that something with clean-room created? Sounds time consuming and costly.