To Conitec;
A forum user had been obsessed with a demo I recently posted. He posted several
times indicating this.
Last Saturday, I received a personal message from this user asking if I could
explain a function of my demo, which he stated by the exact name I gave it in
my script! At the time I was very curious as to how he could have obtained this
information. At no time did I divulge any information to him.
Later I received another personal message from this same user in which he
stated he had disassembled my resource file and had been able to, quote "get a
good bit converted", "back into c-script". He then gives me information that
proves he has done this. The only way he could have exact function names and
methods is by doing what he claims to have done. He further tells me he is only
missing a few crucial lines and asks if I could explain it to him! He states
that (since he knows the function names in my WRS), he could just use my
resource file in his own project!
I know the wrs is encrypted, but it is not so once in memory, and memory can be
dumped. Again, there is absolutely no way this user could know these things
unless he has illegally reverse engineered your product in order to steal my
intellectual property.
The surviving personal messages from this user that I have described above, are
on Conitecs server in my personal messages, and the server administrator can
easily examine them to verify the sender and content.
I have tried to contact Conitec several times about this matter for
consultation, but have not received a reply. I feel I am probably not the only
person this individual has done this to, as he seems "practiced".
I would like to know Conitecs position on this, so I will know how I should
proceed.
Thank you.