Paul Boddie wrote: [snip..] > I've previously mentioned a very interesting paper which not only > described the reverse engineering of the Skype protocol and software > but also described how to make interoperating Skype clients. Given that > the well-financed developers spent a lot of time introducing various > protection measures (encryption, verification, etc.) and yet someone > can write the aforementioned stuff up in a paper, I'd recommend an > upgrade to any business plan which relies on obfuscation to prevent > "unauthorised" use or modification. Indeed, I'd recommend that any such > entrepreneur think twice about starting a traditional proprietary > software business in this day and age. >
How many users did skype have before that happened... Several orders of magnitude above what is required to earn a living from selling a few programs I suspect. Fuzzyman http://www.voidspace.org.uk/python/index.shtml > Paul -- http://mail.python.org/mailman/listinfo/python-list