Originally Posted by
fifties
You continue to miss -or ignore- something I have continually posted, so I am going to isolate it for you; the term is...................................
"discovery".
I know that you know what this procedure is, but for the benefit of those who don't, it is the process wherein each side presents to the other all of their evidence, the purpose being that no surprises surface at the actual trial, and additionally the potential to settle and avoid trial, if one side sees an unavoidable defeat.
Now in this particular type of situation, IF Charlie's lawyer displays ISP logs showing a connection between the defendants ISP and the IKS server addy, and IF defense council advises against a claim that his client's WiFi must have been hacked, then the two pieces of evidence -the purchase of the code and the ISP logs- should be sufficient.
Don't forget, although Dave often won, he also lost cases where he tried to argue in court that folks purchasing items that could hack his service, actually did so with them. In fact, I believe at least one U.S. Circuit Court developed a backlash toward his tactics, after a period of time.
I still maintain that a D of "I bought the code, but never used it, because I never bought a receiver", is valid, and especially so if they can produce no logs. But that's just my opinion.