Swyter said:
themendios said:
Swyter said:
Second. You can be legally owner of the code.
Where are you getting this from? The code isn't yours. The rest is irrelevant because it relies on this being true.
MY code is mine.
MY code parts are
MINE. Every discernible byte non included in the original implementation belongs to me. That doesn't applies to modified parts/ reimplementations of the native code. Of course.
And you, my friend. By creating the decompiler have broken the End User License Agreement.
No, how can I rephrase "you can't own an algorithm?" Essentially, the only parts of the code you own are the creative parts-how it fits together to form the mod, displayed strings, variable names, comments, etc. He hasn't broken the EULA (or at least, not anymore than a normal modder has), and even if he has, didn't Thorgrim break the EULA with his map editor? That surely reverse engineered map.txt. Or what about OpenBRF and BRFedit? Their creators reverse engineered the brf format.
And what of WSE? If anyone broke the EULA, it's cmpxchg8b, yet Taleworlds has yet to shut him down. So, considering how lax TW is with enforcing that part of their EULA, I'd say a judge would consider that section of the EULA void in respect to modding.
Swyter said:
Sorry but bytecode reconstruction is today called that.
As you can see you give away a cyphered/ obfuscated operation codes ordered in conditional conforming a determinative logical chain.
By decrypting the operation code array you're exactly and solely reconstructing the readability of the same.
It's the same in Assembler, ARM, X86, or proprietary implementations.
First, this is hardly the same as using a low-level language, but I'll bite. Ciphering and obfuscation have two teeth-the software tooth and the legality tooth. The software teeth is the function of the obfuscation/cipher: in this regard, a better cipher/obfuscator is paramount; however, for the legal tooth, the quality doesn't matter, it's solely the presence: it allows you to say to a judge, "Hey, I obfuscated this with the purpose of preventing reverse engineering (which I reserve the right to deny) and he went and cracked it anyway!". It doesn't matter if you used a cipher that would have taken 15 minutes to brute-force decode or the most effective obfuscator ever, a judge will recognize that you tried to prevent reverse engineering in that regard and rule with you.
However, what we have here isn't even a direct translation--it's a declaration of variables for convenience. I could change all the opcode identifiers to foo#, but that doesn't do jack to the text file or even what the process_*.py files see when run. There is no cipher, nor is there an obfuscator (no, dropping most of the variable names doesn't count as obfuscating), so neither tooth is present.
JatuWrangler said:
Now, given that you write your own application that can output those plain text files that the engine needs to execute your scripts then yes, that would be your own.
A good point raised, and a good point for me to keep in mind later.