Tracking Code to Its Origins? 59
openbear writes "While doing a code review for a closed source project at work I came across a few files that were stolen from an open source project. The individual that did this was dumb enough to leave the original license in one of the files, however he was smart enough to remove all trace of where the code came from. He since quit the organization, so we (the developers) can't get to him to find out where he got this code from. Now management wants us to ship the product as is (with the stolen code intact) because we can't point to the original source of his questionable code. A few of us scoured sourceforge and several apache projects but couldn't find anything matching. My question is: What is the best way to track down where this code originated from. Is there an organization that would help? A tool? A website?"
Re:Try www.google.com (Score:2)
Except it's not as easy as just feeding in the file and saying "find it", partly because google only allows you to feed in a few search terms and partly because it sounds like the files have been modified from their origional form.
Another problem is that it's very likely that the source files will only be stored within tarballs, which google doesn't index (not that I've ever seen at least -- would be a nice feature though seeing as how they do decode office docs and the like). The key will probably be then, to search by the names of source files, unique looking variable names, or phrases from the comments. With luck, some of these things will manifest themselves in some sort of on-line discussion about the source, such as diffs posted to mailing lists or something of that nature.
Another thing to try -- if you know the nature of the origional program that the source was taken from, go to Freshmeat [freshmeat.net] and look though projects of that type and see if you can find a match.
-"Zow"
Re:Try www.google.com (Score:2, Informative)
Assuming the code hasn't been too modified, he can try searching for function or variable names.
Another problem is that it's very likely that the source files will only be stored within tarballs,
True but many opensource projects have html front ends to their cvs trees, google sometimes index these. Same for mailing list archives, they'll sometimes contain patches or discussions of the code which include parts of the code.
what about rewriting the code? (Score:5, Insightful)
-Vic
Re:what about rewriting the code? (Score:1)
Re:what about rewriting the code? (Score:3, Informative)
** And by show-stopping bug, I mean broken core functionality or something deemed important by management.
Re:what about rewriting the code? (Score:3, Informative)
** And by show-stopping bug, I mean broken core functionality or something deemed important by management.
I call getting the pants sued off you something "deemed important by management".
Several of you fucked up - this code got into the project without being checked where and who wrote it. Now rewrite and reintegrate and retest, and remember this lesson.
Re:what about rewriting the code? (Score:2)
You are missing the whole point of this article. Management doesn't consider this code stolen unless we can prove where it came from. Once we can point to the origins of this "questionable" code then we can remove it from this release. Otherwise it has to wait until the next release (in which case it is too late).
Several of you fucked up - this code got into the project without being checked where and who wrote it. Now rewrite and reintegrate and retest, and remember this lesson.
Again, this is another point of me posting the original article. I want to be able to prove this code is stolen so that we don't hire this guy again as a contractor, and maybe management won't be so blindly trusting to contractors in the future (LOL).
Re:what about rewriting the code? (Score:2)
Perhaops if you posted some snippets?
Re:what about rewriting the code? (Score:1)
You have got to be kidding. What are you suggesting - every time a programmer in any shop in the world writes (or, as you might put it, "claims to write") a piece of code, his/her peers or manager should do a Google search on it?
Re:what about rewriting the code? (Score:2)
Tried Google? (Score:5, Informative)
Run through google groups, etc. If it's from a popular project, Web based cvs is gonna be on it and Google will have sucked up the source.
Other than that, I really don't know.
Re:Tried Google? (Score:1)
Re:Tried Google? (Score:2)
Try searching using variable names, if you choose a *number* of the longer ones and search using OR semantics, I would expect some success.
Also use the meta-search engines like http://www.go2net.com to cover more ground more quickly.
Have you considered this 'may be' the contractors lib and may not exist as such in the wild.
What language are we talking about ?
Errr, you still need to try harder... (Score:5, Interesting)
You didn't mention what license this is. Is it the GPL? If so, that means that you have actually managed to stumble on one of the rare situations where the GPL is actually viral! If you release this code, you will be legally obligated to provide source to any customer, just for the asking!
If it's not one of the 'viral' licenses, then you haven't got a problem anyhow.
This isn't even a copyright law issue per se; the onus is on you/your company to find the source of the code, and get permission to use it, or face the consequences of not doing so. This is a general principle in the law.
The law only rarely lets "I tried as hard as I could!" be an excuse. If you can't get permission, you can't use it, end of (legal) story.
You are asking for it. Hate to say it, but consult a lawyer! Consult a lawyer! Consult a lawyer!
Re:Errr, you still need to try harder... (Score:1, Insightful)
You don't have to agree to the terms of the GPL (or many of the other opensource licenses). But if you don't agree, standard copyright applies, and so you are now violating copyright law by re-distributing the source code.
So his company can probably pick: license violation or copyright violation. Which is worst, I don't know, but copyright law isn't "viral".
Either way if word gets out which company this is, I hope people copy their programs to every corner of the web and send them into bankruptcy.
Re:Errr, you still need to try harder... (Score:4, Insightful)
No, there's the two legal options, too: Find the author and obtain permission, possibly with the judicious use of cash, or dike the code out and replace it with something they wrote.
but copyright law isn't "viral".
I can derive no meaning from that phrase. My best-guess rebuttal is that yes, if the code was GPL'ed and they release it, then they are legally obligated to release the source to the whole program under the terms of the GPL. They may refuse; they may also go on a murderous rampage, slaughtering all in their path. But not legally.
(I admit it, I posted this reply just for the last mental image.)
Re:Errr, you still need to try harder... (Score:2, Insightful)
If you steal source code from another proprietary project (say microsoft), once you get caught microsoft doesn't neccessarily own your project. You usually just pay fines and restitution, maybe get jail time, and of course be forced to remove the offending code. Its copyright violation. You don't need to "accept" any terms of any license to steal the code.
An example of pure copyright violation is the Cadence vs. Avanti [eetimes.com] settled last year. A few ex-cadence employees took cadence code with them when they left to create Avanti. They payed hundreds of millions in restitution, one guy (Yuh-Zen Liao) even got 1 year jail time. I submitted this story when it happened as it involved source code and would seem to be a good story for the slashdot crowd, but sadly it was rejected. A full recap here [eet.com]. May this story act as a deterrent to anyone thinking of stealing source code.
Re:Errr, you still need to try harder... (Score:1)
Re:Errr, you still need to try harder... (Score:2)
Still, I think my original post stands reasonably true. If you distribute code containing GPL'ed code, then by the terms of the GPL, you have agreed to the terms of the license and are under the obligations. That you can decide to simply ignore them and basically go renegade really doesn't change my point; ignoring the law is always an option, and I tend not to advise it, except under extreme circumstances
On the off chance the original poster is watching, be aware that doing this knowingly will probably make things worse. AFAIK, there's no explicit provisions in the law for intent in this case, but come penalty time, if the opposition can show foreknowlege, the judge will be more inclined towards the higher side of penalties; that's exactly the kind of decision human judges are there for.
This is a first... (Score:2, Informative)
Re:This is a first... (Score:2, Informative)
public static String encode(String data)
public static String decode(String data)
Most implementations of base64 that I have seen use byte arrays instead of Strings. I have tried searching Google using the filename "Base64.java" and the various method signatures, but no luck. The original stolen code is dated (in the comments he forgot to remove) from about two years ago. This is probably why I can't find it on Google or SourceForge.
I realize that this isn't much to go on, but like you stated, I don't want to violate the NDA and lose my job.
Re:This is a first... (Score:1)
Not only that but because it's a utility method with well-defined pre/post conditions it would be trivial to put a complete junit test suite around it so you can be assured it works.
good luck.
Re:This is a first... (Score:2, Interesting)
Believe me, this whole thing is/has taken way to much of my time. I'm just trying to stay focused on doing the ethical thing.
link to the code. (Score:3, Informative)
Management is just as guilty (Score:2, Insightful)
If your management beleives this, they are just as guilty as the original stealer. Call the police on the original coder and when the shit hits the fan he'll take the blame instead of your company. Either way, get that code out of your program ASAP!
What does it do? (Score:1)
Are you sure its stolen? (Score:2, Interesting)
Did he leave on good terms? Was he angry at anyone when he left?
I just thought of a great way to mess with a company if I'm a coder who doesn't care about references. Insert the GPL into a bunch of my source files that I spent a lot of time on. As long as I was working alone on that code they wouldn't know I didn't swipe it from a GPL project. They may evenspend a bunch of time looking for the original source. They may even post a slashdot story about it.
I supposed you tried calling this guy and asking him.
A setup? (Score:2, Insightful)
How do you know it was stolen? (Score:3, Insightful)
There are any number of legal possibilities, and I can't see that they can be simply discarded based on the information provided.
Re:How do you know it was stolen? (Score:2, Interesting)
I wrote it (Score:3, Funny)
Re:Do a different search? (Score:2)
(Blargh, it's 0430 and I made one "little" change after previewing my post. Here it is with the bold tag closed; sorry for the "yelling.")
He since quit the organization, so we (the developers) can't get to him to find out where he got this code from.
Okay, so you've tried to search for the code, and came up empty... Did he die? If not, then I'd suggest you try to search for him! There's not a lot of info in your post, so some of these may not be appropriate -- don't know if he's still in the same city, state, or country, for that matter.
That should be enough to get you started; I'm sure if you brainstorm you can come up with some other sources and/or techniques, too.
Re:Do a different search? (Score:3, Interesting)
Re:Do a different search? (Score:3, Insightful)
Grep for it! (Score:4, Insightful)
Also, you might paste a few lines into a comment on this thread and see if anyone recognizes it.
Re:Grep for it! (Score:2)
Please tell us the company and the product (Score:1, Funny)
Re:Please tell us the company and the product (Score:1)
Undergarment surface contact point alteration and helixification algorithms are already heavily patented. I thus suggest another outcome be attempted.
Try a more careful set of search terms?? (Score:2)
Best of luck in your efforts.
I'm almost sure you've tried this, but... (Score:1)
Find a unique line in the text/code/whatever, and search for it as a string in several search engines. If it's anywhere on the web, this tends to be a success.
I've used it with source code a time or two, but it's most frequently useful when I hear a song on the radio... I just memorize a line or two, because the DJ invariably fails to name it after it plays.
just release the code (Score:1)
Our standard 20% [of all you got] is fine.
Here are two methods ... (Score:3, Informative)
public class Base64 {
public static String encode(String data) {
int c;
StringBuffer ret = new StringBuffer();
try {
byte[] arr = data.getBytes("iso-8859-1");
int len = arr.length;
for (int i = 0; i < len; ++i) {
c = (arr[i] >> 2) & 0x3f;
ret.append(cvt.charAt(c));
c = (arr[i] << 4) & 0x3f;
if (++i < len)
c |= (arr[i] >> 4) & 0x3f;
ret.append(cvt.charAt(c));
if (i < len) {
c = (arr[i] << 2) & 0x3f;
if (++i < len)
c |= (arr[i] >> 6) & 0x3f;
ret.append(cvt.charAt(c));
} else {
++i;
ret.append((char) fillchar);
}
if (i < len) {
c = arr[i] & 0x3f;
ret.append(cvt.charAt(c));
} else {
ret.append((char) fillchar);
}
}
} catch (Exception e) {}
return(ret.toString());
}
public static String decode(String data) {
int c;
int c1;
StringBuffer ret = new StringBuffer();
byte[] arr = data.getBytes();
int len = arr.length;
for (int i = 0; i < len; ++i) {
c = cvt.indexOf(arr[i]);
++i;
c1 = cvt.indexOf(arr[i]);
c = ((c << 2) | ((c1 >> 4) & 0x3));
ret.append((char) c);
if (++i < len) {
c = arr[i];
if (fillchar == c)
break;
c = cvt.indexOf((char) c);
c1 = ((c1 << 4) & 0xf0) | ((c >> 2) & 0xf);
ret.append((char) c1);
}
if (++i < len) {
c1 = arr[i];
if (fillchar == c1)
break;
c1 = cvt.indexOf((char) c1);
c = ((c << 6) & 0xc0) | c1;
ret.append((char) c);
}
}
return(ret.toString());
}
private static final int fillchar = '=';
private static final String cvt = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
+ "abcdefghijklmnopqrstuvwxyz"
+ "0123456789+/";
}
Here it is. (Score:1)
Re:Here it is. (Score:1)
/de/acid/util/Base64.html
Re:Here it is. (Score:1)
Not bright (especially not on a tech site), and it bit me a few days ago.
web logs (Score:2)
Country (Score:2)
Your country may be important.
In the UK, breaching copyright law for a commercial gain is a criminal (theft by deception) as well as civil offense and it is the companies Officers (Directors) are who deemed responsible and do the Gaol (jail) time.
Looks like this is it (Score:4, Informative)