I know that there are many legality issues with reverse-engineering software. On the other hand, I also know that many successful drivers have been reverse-engineered from the way that hardware interacts with closed-source software for use in open-source operating systems and projects (like Linux).
So, my question would be (for those familiar with such things): what would the legality be in, say, observing the opcodes and data sent over the USB while flashing the U3 partition and then duplicating that process in an open-source application to allow for flashing of the U3 drive by end-users?
I think we need Bruce to comment on this
I think (don't quote me on this) that we (Libertà Project) was going to do this at some point. (Renè, comments?)
----
R McCue
Cube Games
People who didn't need people needed people around to know that they were
the kind of people who didn't need people.
(Maskerade)
"If you're not part of the solution, you're part of the precipitate."
If an attempt was made to somehow prevent you through cryptographic or other means from getting knowledge of the protocol, your reverse engineering could be seen as an attempt to circumvent technological protection measures. In that case you may run into trouble with the DMCA if you are from the USA that is.
Take a look at chilling effects for more information.
PS. IANAL
I wonder, do we have anything like the DMCA in Australia?
(That was off-topic)
----
R McCue
Cube Games
People who didn't need people needed people around to know that they were
the kind of people who didn't need people.
(Maskerade)
"If you're not part of the solution, you're part of the precipitate."