Say "No, Thanks" to Offers of Illegal MS Source Code

As a reminder to our readers, we are repeating the same advice we published in 2000, the last time Microsoft's source code was compromised. Don't look at it or you could contaminate yourself legally.

The Wall Street Journal reported today [October 27, 2000 -- Ed.] that Microsoft and the FBI are investigating an intrusion in which unknown attackers had access to Microsoft source code for three months. Although nothing purporting to be Microsoft source code copied in the intrusion has surfaced yet, any such code poses a legal risk to people who read it and to any free software project that accepts contributions from those people.

"Anybody who wishes to be involved in free software should have nothing to do with anything claiming to be Microsoft source code released without license or in any informal way," said Eben Moglen, general counsel of the Free Software Foundation and professor of law and legal history at Columbia University. Microsoft, he said, would be in a position to seek damages from anyone trafficking in misappropriated trade secrets, which can include merely reading the Microsoft code and then contributing to a free project.

If offered any code that implements Microsoft-like APIs, or uses Microsoft's file formats or protocols, the FSF will go beyond its normal legal paperwork to make sure that the contributor has not had contact with Microsoft's proprietary information. "We would certainly take additional measures to prove the absence of any relationship between developers and Microsoft's trade secrets," Moglen said.

Free software developers are already careful to keep themselves insulated from any contact with proprietary information. Jeremy Allison, one of the lead developers on the Samba project, said that his response to one anonymous offer of Windows NT source code was, "You're offering to end my career. Thanks but no thanks." And the Samba team, he said, will refuse to work with anyone who has seen Microsoft's proprietary code. "Anything we do has to be completely legal," he said. "There are plenty of people who can work on it who haven't seen Microsoft source code." His advice to anyone planning to write free software in the future is, "Stay away from [proprietary Microsoft source code] at all costs."

News reports blamed the Microsoft intrusion on aTrojan Horse program that installs when a Windows user opens an e-mail attachment in Microsoft Outlook.

______________________

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Another good reason to steer clear

Anonymous's picture

Besides... why introduce bad code into good projects? ;-) Please do us all a favour and keep Linux free of BSOD code.

Re: Say

Anonymous's picture

This could be a Microsoft invention, with the sole purpose of
having an excuse to sue the " Free software movement' and
possibly stop it, because it is a threat to microsoft monopoly!!
Think about it !!!!

Great advice

Anonymous's picture

Thanks for publishing such great advice. This is clearly the responsible approach that needs to be well understood by members of our community. Personally, I would not be surprised to learn that this "leak" was done intentionally in order to serve as "bait" to those that would risk compromising (knowingly or not) the integrity of some very important Free Software projects which deal with Windows compatibility. We shall see how this plays out....

Btw: that "News Reports" link doesn't actually resolve to anything useful.

Best

Adam Kosmin
WindowsRefund.net

Re: Great advice

frymaster's picture

my gut reaction to this advice is to cry "tinfoil hat". after all, even if the leaked source is viewed by an oss developer, redmond will still have to prove sufficient similarity in the source to get any satisfaction in court.

however... it's well known that microsoft forbids its developers from viewing any open code, most notably that which is under the gpl. maybe "the beast" has the right idea.

Re: Great advice

cig's picture

I personally agree, as a programer and as a FOSS fun.
For more info I suggest reading GROKLAW.
Does not give permanest answers, but its definetly worth reading (especially ppls comments).

White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState