http://www.torrentspy.com/article.asp?id=3729 - Article
http://www.x86labs.org/forum/index.php?topic=3322 - x86 Discussion
From x86's forum: "Post by Joe: Quik, heres a situation. You get raped by horde in the middle of nowhere, die, release spirit, spirit heal, and hearthstone. You have 10 minutes to kill, so you work on a top-secret programming project like JavaOp2 (BAD EXAMPLE, LIVE WITH IT <3).
Blizzard now has your source code."
lol.
Quote from: guy
Once these strings are obtained, they are passed through a hashing function
So they got nothing. Unless they already know your shit. Now stfu case closed.
Quote from: Shout on October 11, 2005, 10:03 PM
Quote from: guy
Once these strings are obtained, they are passed through a hashing function
So they got nothing. Unless they already know your shit. Now stfu case closed.
Linkage? I bet he has no clue what hes talking about. Not even somebody as stupid as Bush would hash data and send it over a game protocol where it can't be used for anything.
Try reading the whole article.