John had heard that some colleagues had obtained product keys from questionable sources, but he was hesitant to take that risk. He worried about the potential consequences of using a pirated key, including software instability, security risks, and even legal repercussions.