| http://www.w3.org/ns/prov#value | - If someone with illegally-obtained source code anonymously posts the Ghost and other file formats AND posts a credible here is how I reverse engineered the file formats" document, and others use it to create open-source software to read the software, will Symantec have any recourse against those who write, host, or use the resulting software?
|