Hacker Newsnew | comments | show | ask | jobs | submit login

(Follow up: JCR's comment seems to make it clear that's what is being distributed here doesn't constitute reverse engineering in the legal sense. I hadn't actually looked at the files. Ah well.)



And what are jcr's credentials? Not everyone that posts on HN is an expert or should be assumed to understand their subject matter.

-----


No, but he seems factually correct that the files are IDA Pro output from Skype binaries, and a patched/modified version of a Skype binary.

This is as opposed to publishing observations/specifications from looking at such dumps, or from a black-box observation of Skype's behaviour. In this case I believe jcr is 100% correct that what's being distributed isn't protected reverse engineering output, it's a derivative work of the original.

In short: Decompiling or cracking a program and posting it online with notes is not the same as reverse engineering it, although it's a step in that direction.

-----


Hmm, so you aren't smart enough to attack JCR's ideas, so you go after his character? Are you stupid or what?

Can we even believe anything that cookiecaper says? I mean, what's HIS credentials?

(see what I did there? Ad hominem attacks are just that: logical fallacies. Please don't do them.)

-----


It wasn't an ad hominem attack and I have nothing against jcr. I don't even disagree. I just felt it was important to advise people to check their sources since the parent comment seemed to be putting a lot of trust in a comment that could easily contain misinformation.

No offense intended. :)

-----


> No offense intended. :)

None Taken. :)

But to answer your question:

- I have no credentials, and don't want any.

- I am not an expert, and don't want to be one.

- For every bit of the subject matter that I've learned, I can name at least a half dozen people who know that bit better than I do.

I would suggest not wasting your time trying to authenticate me, the source, but instead, put your effort into finding outside authentication of the statements. The source in this case really doesn't matter, but outside confirmation really does matter.

-----




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: