Maybe some activists involved in exposing Desteni will release some of the material to free file hosting websites, so they can be analyzed by those who are exposing Desteni.
Anyone can search Google for:
free file hosting
If they do not have the source code for the software, that would prove that in fact they just took it from the brother.
The software could be compared, to see what extent they are similar, or if they are the same thing.
The software could be uploaded and analyzed by some ethical "hackers" to see to what extent the code matches.
And the spelling mistakes and crash reports could be posted in this forum.
Obviously no one should ever spend one penny to buy a software which may simply be hijacked, and is full of crashes and mistakes.
Who knows, someone could have put a keylogger Trojan virus into the software, which then monitors every word typed by the user, and sends it back to the mothership. Happens everyday.
------------------------------------------
[
antivirus.about.com]
"What is a Keylogger Trojan?
From Mary Landesman, former About.com Guide
In its simplest form, a keylogger trojan is malicious, surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner.
Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for specific activity - like opening a web browser pointing to your online banking site. When the desired behavior is observed, the keylogger goes into record mode, capturing your login username and password.
...
Keyloggers and other forms of remote-access trojans tend to be the most determined malware, taking extra steps to stealth its presence, including through the use of rootkits. "