Comment by intea
7 years ago
So you're using their "leaked" or reverse engineered information? That's just IP theft with extra steps.
7 years ago
So you're using their "leaked" or reverse engineered information? That's just IP theft with extra steps.
If this is made to ensure compatibility with programs using those undocumented structures then it is a different thing. They become a part of API.