this post was submitted on 21 May 2024
40 points (97.6% liked)
Asklemmy
43340 readers
2067 users here now
A loosely moderated place to ask open-ended questions
Search asklemmy ๐
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- [email protected]: a community for finding communities
~Icon~ ~by~ ~@Double_[email protected]~
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Proton is built on top of wine for windows compatibility. The wine project has been very careful to independent build its compatible versions of libraries. There should be no Microsoft code in wine.
I think should is the biggest risk here. With the source code leaks for Windows XP and others, I imagine it'd be quite tempting to reuse some of Microsoft's code for the more obscure API calls that aren't implemented yet. The Wine project itself does its very best to avoid doing that, but one lying contributor can throw a wrench into the works.
The people behind Wine are quite vigilant, so I don't think Microsoft will find any of its (closed source) code in the project.
Even then you can still have someone read the source and write a spec for a second programmer to write a library. The programmer never saw the source code but it was still useful. Still legal to do this. If someone dumped original source into the projector could be similarly checked for duplication without breaking the law.
That's true, but white room reverse engineering requires two people to do what one person could do by just stealing the code. Plus, the person reading the source code would be "burned", they can't work on normal implementation after browsing the source.