Comment Prove the Violation (Score 2, Informative) 779
Can someone clearly identify what specific GPL code was violated? If the only modifications were in user space, or were proprietary kernel modules (not statically linked to the kernel) then there may in fact be no violation (with the possible exeption that they fail to tell you how to get your modified binaries onto flash - the so called control and loading scripts). So far, I see a pile of "oh they are bad people" and not enough of "this is the specific violation they made."
It is not a violation to include proprietary kernel modules, nor to have proprietary code in user space. From what I can see, that is where it's highly likely the vendor code lives.
Does anyone have any evidence to the contrary?