I understand. But sometimes, there are other protective measures in place (not necessarily planned) that stand in the way of reverse engineering. There can for instance be specific assets (tangible or intangible) involved in relation to the complexity of the device or solution that make it difficult or even impossible to replicate the solution. But we digress.
