473,385 Members | 1,396 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

A legal question about obfuscation.

Hi all

Figure this scenario:

- My Company develops an assembly (a controls DLL)
- Since an obfuscation software is too expensive, my Company engages a
consultant and delegates him the assembly obfuscation process
- The consultant uses his (regulary purchased and licensed) obfuscation
software for obfuscate my Company's assembly
- My Company pays the consultant and receive back the obfuscated assembly
- My Company sell the obfuscated assembly on Internet (without having a
licensed copy of the obfuscation software)

In your opinion, is this LEGAL?

Thank you.

John Ti.

May 10 '06 #1
10 2167
> In your opinion, is this LEGAL?

Opinions don't count, unless you're a judge. Yes, it's legal.

--
HTH,

Kevin Spencer
Microsoft MVP
Professional Numbskull

Hard work is a medication for which
there is no placebo.

"John T." <no***********@gmail.com> wrote in message
news:eV**************@TK2MSFTNGP03.phx.gbl...
Hi all

Figure this scenario:

- My Company develops an assembly (a controls DLL)
- Since an obfuscation software is too expensive, my Company engages a
consultant and delegates him the assembly obfuscation process
- The consultant uses his (regulary purchased and licensed) obfuscation
software for obfuscate my Company's assembly
- My Company pays the consultant and receive back the obfuscated assembly
- My Company sell the obfuscated assembly on Internet (without having a
licensed copy of the obfuscation software)

In your opinion, is this LEGAL?

Thank you.

John Ti.

May 10 '06 #2
Generally I would say things are ok. Your best option is to talk with an
attorney, who is familiar with local practices (i.e. state/federal laws).

Cheers,

Greg Young
"John T." <no***********@gmail.com> wrote in message
news:eV**************@TK2MSFTNGP03.phx.gbl...
Hi all

Figure this scenario:

- My Company develops an assembly (a controls DLL)
- Since an obfuscation software is too expensive, my Company engages a
consultant and delegates him the assembly obfuscation process
- The consultant uses his (regulary purchased and licensed) obfuscation
software for obfuscate my Company's assembly
- My Company pays the consultant and receive back the obfuscated assembly
- My Company sell the obfuscated assembly on Internet (without having a
licensed copy of the obfuscation software)

In your opinion, is this LEGAL?

Thank you.

John Ti.

May 10 '06 #3
I know with Dotfuscator Pro, the license you buy is for each developer that
will be obfuscating anything. In this case, there is still a license legally
purchased for this guy, who is obfuscating what you want. If he's using a
licensed copy of Dotfuscator for his obfuscation, I would think he's in the
clear. For some other obfuscation softwares it may be different.
--
KMG Software, Inc.
Thinking Beyond, Above, and Before
http://www.kmgsoftware.com
"John T." wrote:
Hi all

Figure this scenario:

- My Company develops an assembly (a controls DLL)
- Since an obfuscation software is too expensive, my Company engages a
consultant and delegates him the assembly obfuscation process
- The consultant uses his (regulary purchased and licensed) obfuscation
software for obfuscate my Company's assembly
- My Company pays the consultant and receive back the obfuscated assembly
- My Company sell the obfuscated assembly on Internet (without having a
licensed copy of the obfuscation software)

In your opinion, is this LEGAL?

Thank you.

John Ti.

May 10 '06 #4
On Tue, 9 May 2006 11:19:59 +0200, John T. wrote:
In your opinion, is this LEGAL?


People here are devlopers, not laywers so even if somebody here tells you
that it's legal, i doubt that the judge will take that into account if it
happens to actually be illegal. Your best bet would be to contact the
licensing department of the compnay that sells the obfuscator that is going
to be used and get a clear and written answer from them about the legality
of what you want to do.
May 10 '06 #5
Hi all- This is Jenn from PreEmptive Solutions (the creators of
Dotfuscator and DashO). I noticed your recent conversation and wanted
to provide some insight. I am not sure what obfuscation solution the
third party consultant is using but we clearly state our position
within our EULA. Please see sections 2 and 6 of our EULA:

2. Restrictions on Use of Software. Licensee may install and use the
Software only for your internal business purposes. Licensee will not
rent, lease, lend, sublicense, redistribute or otherwise allow third
parties to use the Software directly or indirectly, whether on a time
sharing, remote job entry, or service bureau arrangement or to provide
commercial hosting services to third parties. Subject to the other
terms of this License, Licensor may freely distribute applications that
it has processed using the Software.

6. No Modification Non-Use by Third Parties. Licensee may not modify
the Dotfuscator files, executables, or otherwise. Use of this software
is limited to first party applications. Licensee may not, directly or
indirectly, provide as a service, use of the Software. By way of
example, but not as limitations these includes providing a networked
interface to the software, direct or indirect use of the Software for
other persons by the Licensee, or knowingly allowing third parties to
access the Software. This License is for the use of the Software in
object code form only. Licensee agrees to take all reasonable
precautions to secure the Software from distribution to any third
party.

I do not claim to be a judge or a lawyer. I am just presenting this
information for your review.

If anyone has any questions please feel free to contact me at
je**@preemptive.com. TXS.

May 10 '06 #6
So the developer may be OK, but the consultant could be in trouble?
May 10 '06 #7
PIEBALD wrote:
So the developer may be OK, but the consultant could be in trouble?


Yes. Any claim that the creator of the obfuscator software might have
would be against the person or company that bought the license, not
against the third party.
May 10 '06 #8
After reading the post of Jenn, I agree with this interpretation.
IMHO, the Company cannot be considered out of law. To the Company is not
required to read EULA of obfuscator software.
Consultant must honour the agreement of the obfuscators' EULA


"Göran Andersson" <gu***@guffa.com> wrote in message
news:Ok**************@TK2MSFTNGP04.phx.gbl...
PIEBALD wrote:
So the developer may be OK, but the consultant could be in trouble?


Yes. Any claim that the creator of the obfuscator software might have
would be against the person or company that bought the license, not
against the third party.

May 10 '06 #9
On Wed, 10 May 2006 09:06:16 +0200, John T. wrote:
After reading the post of Jenn, I agree with this interpretation.
IMHO, the Company cannot be considered out of law. To the Company is not
required to read EULA of obfuscator software.
Consultant must honour the agreement of the obfuscators' EULA


But if the company is fully aware when they hire the consultant that the
whole thing is illegal (as is the OP now), i bet that they'll have to share
their part of responsability too (just as when you buy stolen goods knowing
that they are stolen)
May 10 '06 #10
PIEBALD wrote:
So the developer may be OK, but the consultant could be in trouble?


Only if the EULA is legal in the country it's used. I've seen plenty of
EULA's that are worth nothing over here (or at least parts of the EULA).
So it's best to check with a lawyer which knows how to deal with EULA's.
--
Rinze van Huizen
C-Services Holland b.v
May 10 '06 #11

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

13
by: vincent | last post by:
I made the suggestion "Need built in obfuscation support in C# compiler" to Microsoft. Anyone here agree with me? If yes, please cast your vote on this suggestion to raise its priority.
2
by: Derek Martin | last post by:
So I learned all about strong naming and how that is a good thing. Then I learned the my assemblies can be decompiled with the SDK and how that was both good and bad. So I learned about...
3
by: ..:: Kevin ::.. | last post by:
Is it possible to perform obfuscation on code automatically as part of a build in Visual Studio 2003? For example, instead of building code in release mode, is it possible to create a custom...
32
by: GK | last post by:
Hello, Can anybody suggest a best code obfuscation tool based on their exeperience ? (e.g.: testing effort after obfuscation is 0) thanks, GK
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.