preferably with stolen source code and assets