Jon Skeet said:
Has anyone got any actual examples of where this has really happened
with .NET? I've seen a lot of people being worried about getting
bitten, but no-one actually *getting* bitten.
Heck... I haven't seen any companies that use .Net for the kind of stuff we
write around here so that's a bit of a trick question. For that matter, I
haven't seen anything "real" written in .Net at all.
In your "No Software Is Truly Safe" section, you have "how many of your
potential customers do you think want to rip you off". In my case, probably
zero (for now). In a shareware authors case, probably 50%. That's a
shareware author that has to go spend >>at least<< $1500+ for an obfuscator.
Then, they can probably go to another site and find a crack to de-obfuscate
that obfuscator <g> Right here in this group, a few months ago, there was a
guy selling his disassembler/de-obfuscator that supposedly could "crack" any
obfuscator on the market. That's pretty bad. Even if only 1/4 true. Sure,
you can disassemble VB Classic code. What you end up with is raw assembler
language. There is no tool available that would take that assembler code and
"pretty it up" to make it look like VB source.
Your "Decompilation Makes .NET Applications Open Source" isn't a myth I've
heard. The Open Source community has licenses that specify what you can do
with the source you find there. Decompilation has nothing to do with any of
those licenses. If you can simply grab large chunks of code from a
component, re-arrange it a bit to make it look like it's your own work and
resell it, that's not open source, that's stealing hard work that someone
else did. Huge difference.
No customers can steal our source. Since we don't specifically protect any
of our components, if they can figure out the interfaces, they can install
and use our components on their own PCs. As previously mentioned, our
customers most likely have no interest in any of that. When they buy from
us, they're buying a machine that's controlled by a PC. The software is
never "sold separately" and, as long as it works right, the customer never
even opens the folder that contains our software (now to figure out a decent
way of sending 440 volts directly to any hot-dog network admin that wants to