This is as opposed to publishing observations/specifications from looking at such dumps, or from a black-box observation of Skype's behaviour. In this case I believe jcr is 100% correct that what's being distributed isn't protected reverse engineering output, it's a derivative work of the original.
In short: Decompiling or cracking a program and posting it online with notes is not the same as reverse engineering it, although it's a step in that direction.
Can we even believe anything that cookiecaper says? I mean, what's HIS credentials?
(see what I did there? Ad hominem attacks are just that: logical fallacies. Please don't do them.)
No offense intended. :)
None Taken. :)
But to answer your question:
- I have no credentials, and don't want any.
- I am not an expert, and don't want to be one.
- For every bit of the subject matter that I've learned, I can name at
least a half dozen people who know that bit better than I do.
I would suggest not wasting your time trying to authenticate me, the
source, but instead, put your effort into finding outside authentication
of the statements. The source in this case really doesn't matter, but
outside confirmation really does matter.