Hacker News new | past | comments | ask | show | jobs | submit login

Surely this code would be useful to a clean room design though?

I.E. someone looks at the leaked code and writes a specification, then posts/shares that spec, and another person or team uses the spec to write a compatible driver without having looked at the leaked source code.

I don't think so. The only thing you're allowed to do is stuff like Wireshark, where you observe the behavior and not the actual code.

Pretty sure that's not true -- I believe you just have to make sure that only a spec gets "thrown over the wall", and no descriptions of implementation or architecture.

Registration is open for Startup School 2019. Classes start July 22nd.

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact