Re: getting hardware data
- Posted by euphoric (admin) May 22, 2012
- 1556 views
bill said...
Someone comes along and uses that project to not only
make a profit for themselves (OK) but make their product
closed source (dodgy) and protected (even more dodgy).
Closed source and protected is dodgy? How so?
bill said...
Euphoric gave advice how to do this with no recognition that
the request was in any way out of order.
In what way could it be construed as out of order?
You have a seemingly strong desire to control/police others. That can't be healthy.
IANAP. YMMV.