(no title)
angus-prune | 2 years ago
One person views the "contaminated" decompiled code and writes a specification. A separate person writes the code based solely on the specification. This is an accepted method of demonstrating that there is no infringement.
stavros|2 years ago