Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The distinction is between using APIs (documented or undocumented) vs using and distributing 3rd party libraries and SDKs.

It's likely that in order to avoid distributing Apple IP one would need to reverse engineer some undocumented APIs, but that's coincidental.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: