View Single Post
Old 31st May 2009
  #7
Here for the gear
 

Our software has been pirated, and in our case I know we can rule out everyone except the end user (in the broadest sense - since it includes people obtaining it fraudulently). In some cases, crackers obtain the software from suppliers who use stolen credit card details to purchase the software. In other cases, I have reason to believe people who have legitimately purchased the software then pass it on to the crackers - whether this is through a third party copying the software from their machine without their knowledge or a deliberate choice, I don't know.