It’s been in my mind if we are using the software/program or even hardware of a tech company, we can play around, install-unsinstall and more. Then how is it so difficult for someone to “unhide” the source code that the device uses? Technically the code is in the device somewhere hidden in it, so it’s there, but still, it’s almost impossible to obtain the source code. How do they achieve this so no one copies their code?
In: 366
The source code for many commercial softwares have been leaked. The real obstacles, regardless of if you stole the source or decompiled it, are legal. There isn’t much useful you can do with it without getting sued into oblivion, and most software is pretty unremarkable anyway in terms of what it does; as in, nobody’s looking at MS Word and scratching their head as to how it does something.
Latest Answers