Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The source code and the database required to make it work contains the names of all spells, instances, quests and their briefings, NPCs...

Maybe they could even claim patents on the protocol? Who knows.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: