Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Look up the term "Chinese Wall".

What's required (for purposes of courtroom defense) is a clearly documented procedure in which those who have access to the source being reimplemented (the spec writers and testers) NOT be the coders, and vice versa.

Another example is the SMB/CIFS reimplementation in the case of Samba. Here, because the protocol was an over-the-wire system, analyzing network packets (not covered by source analysis proscriptions) was sufficient to create a Free Software implementation.



Yeah, we will do it. But now project still at first stage.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: