Feeds

Harvard rivals claim smoking gun in Facebook 'code theft' case

'See you in court... bitch'

Choosing a cloud hosting partner with confidence

The founders of ConnectU, an also-ran social network that emerged from Harvard University around the same time as Facebook, are renewing their charge that Mark Zuckerberg stole their ideas, amid claims of new "smoking gun" instant messenger evidence.

ConnectU was founded by twins Tyler and Cameron Winklevoss, contemporaries of Zuckerberg who employed him to do some coding on their site before he ran off to create Facebook.

The warring rich Ivy League white guys had reached a settlement in April, but on Tuesday ConnectU told a federal court in Boston that it wants out of the deal. A recent forensic search of Facebook's hard drives turned up IM logs that it reckons would prove its case, Bloomberg reports.

Judge Douglas Woodlock was unsympathetic to the change of heart. He said: "The parties chose to do what they did [to settle the case] based on imperfect knowledge of what the outcome of the case might be. You knew at the time you entered into the agreement it wasn't complete."

ConnectU's attorney John Hornick said: "If we are forced into a settlement, the next step is going to be a fraud claim."

ConnectU doesn't actually currently know exactly what's in the IM logs. Part of the deal they cut that allowed their forensics expert access to the Facebook drives prohibited him from revealing specific details of anything other than software code.

Woodlock said the expert had "nevertheless, obliquely given ConnectU's attorneys reason to believe that there were documents, other than produced program code, on the Facebook hard drives relevant to the case which had not been disclosed".

A decsion on whether ConnectU can pull out of the settlement and renew its suit for copyright infringement and theft of trade secrets is set for 23 June in San Jose. Facebook is pursuing a counter-suit against the Winklevoss twins on the west coast. It alleges they nicked user data from Facebook directories while both were still based at Harvard. ®

Internet Security Threat Report 2014

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
French 'terror law' declares WAR on the INTERNET itself, say digi-rights folks
Liberté, Égalité, Fraternité: Two out of three ain't bad
SCREW YOU, EU: BBC rolls out Right To Remember as Google deletes links
Not even Google can withstand the power of Auntie
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.