As far as the questions of the legality in the USA of reverse engineering file formats, the DMCA speaks for itself.<br>These quotations are taken from <b>Sec. 1201. Circumvention of copyright protection systems 
 (f)</b> and can be found at <a href="http://cyber.law.harvard.edu/openlaw/dvd/1201.html">Harvard Law</a>.<br><br><div class="level4">

<p>
 <i>(f) <span class="search_hit">Reverse</span> <span class="search_hit">Engineering</span>.— (1) Notwithstanding the provisions <span class="search_hit">of</span> subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy <span class="search_hit">of</span> a computer program <b>may circumvent a technological measure that effectively controls access</b> to a particular portion <span class="search_hit">of</span> that program <b><span class="search_hit">for</span> the sole purpose <span class="search_hit">of</span> identifying and analyzing those elements</b> <span class="search_hit">of</span> the program that are <b>necessary to achieve</b><strong><span class="search_hit">interoperability</span></strong> <span class="search_hit">of</span>
an independently created computer program with other programs, and that
have not previously been readily available to the person engaging in
the circumvention, to the extent any such acts <span class="search_hit">of</span> identification and analysis do not constitute infringement under this title.
</i> </p>

<p><i>
(2) Notwithstanding the provisions <span class="search_hit">of</span>
subsections (a)(2) and (b), a person may develop and employ
technological means to circumvent a technological measure, or to
circumvent protection af<span class="search_hit">for</span>ded by a technological measure, in order to enable the identification and analysis under paragraph (1), or <span class="search_hit">for</span> the purpose <span class="search_hit">of</span> enabling <strong><span class="search_hit">interoperability</span></strong> <span class="search_hit">of</span> an independently created computer program with other programs, if such means are necessary to achieve such <strong><span class="search_hit">interoperability</span></strong>, to the extent that doing so does not constitute infringement under this title.
</i></p>

<p><i>
(3) The in<span class="search_hit">for</span>mation acquired
through the acts permitted under paragraph (1), and the means permitted
under paragraph (2),<b> may be made available to others</b> if the person
referred to in paragraph (1) or (2), as the case may be, provides such
in<span class="search_hit">for</span>mation or means solely <span class="search_hit">for</span> the purpose <span class="search_hit">of</span> enabling <strong><span class="search_hit">interoperability</span></strong> <span class="search_hit">of</span>
an independently created computer program with other programs, and to
the extent that doing so does not constitute infringement under this
title or violate applicable law other than this section.
</i></p>

<p><i>
(4) <span class="search_hit">For</span> <span class="search_hit">purposes</span> <span class="search_hit">of</span> this subsection, the term <b><strong>"<span class="search_hit">interoperability</span>"</strong> means the ability <span class="search_hit">of</span> computer programs to exchange in<span class="search_hit">for</span>mation</b>, and <span class="search_hit">of</span> such programs mutually to use the in<span class="search_hit">for</span>mation which has been exchanged.
</i></p>

</div><br>So the issue of encryption comes into play when the end user is attempting to bypass digital protection, but the creation of software to help Bible publishers maintain interoperability is explicitly provided for.<br>
<br>Daniel Holmlund<br><br><br><div class="gmail_quote">On Wed, May 21, 2008 at 7:45 AM, jhphx &lt;<a href="mailto:jhphx@cox.net">jhphx@cox.net</a>&gt; wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br>
&gt; Are these EULAs valid?<br>
<br>
When this become a matter of reverse engineering the DCMA also needs to<br>
be considered if the information is protected by something like encryption.<br>
<br>
Jerry<br>
<div><div></div><div class="Wj3C7c"><br>
<br>
<br>
_______________________________________________<br>
sword-devel mailing list: <a href="mailto:sword-devel@crosswire.org">sword-devel@crosswire.org</a><br>
<a href="http://www.crosswire.org/mailman/listinfo/sword-devel" target="_blank">http://www.crosswire.org/mailman/listinfo/sword-devel</a><br>
Instructions to unsubscribe/change your settings at above page<br>
</div></div></blockquote></div><br>