← Back to context Comment by rkangel 10 years ago It is reverse engineering. It's just easy reverse engineering. 0 comments rkangel Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗