1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238
|
Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: hashcash
Upstream-Contact: Adam Back <adam@cypherspace.org>
Source: http://hashcash.org/source/
Comment:
The following are not licensing requirements, just comments from the
author:
.
- If you have to make changes to make this library work for your system or
application it would be useful if you could tell me what you had to
do, and optionally send me the source changes so I can include them
or update the library. The aim is to make a practically useful
library.
.
- It would be useful if you could inform me if you use or distribute
hashcash. The intent here is to give me feedback and insight into the
areas of application which people find useful in practice.
.
- If you are unclear on how to use hashcash there is a FAQ here:
http://www.hashcash.org/faq.html. If that doesn't answer your question or
doesn't apply to your usage, feel free to discuss in email.
.
- It may help the deployment of hashcash as an anti-spam system if different
systems based on hashcash were interoperable as far as that makes
sense for your system. To this end the FAQ
http://www.hashcash.org/faq.html and Internet-Draft
http://www.hashcash.org/draft-hashcash.txt document my
thoughts in this area. See also the hashcash home page
http://www.hashcash.org and paper there as I update with links to deployed
systems which it might be useful for you to interoperate with.
Files: *
Copyright: 1997-2006 Adam Back <adam@cypherspace.org>
License: GPL-2 or LGPL-2.1 or BSD-3-clause or Cypherpunks-CPL
Files: debian/*
Copyright: 2003-2006 Hubert Chan <hubert@uhoreg.ca>
2012 Moritz Muehlenhoff <jmm@debian.org>
2016 Giovani Augusto Ferreira <giovani@riseup.net>
2022 Stefan Kangas <stefankangas@gmail.com>
2025 Simon Josefsson <simon@josefsson.org>
License: GPL-2+
Files: getopt.c
Copyright: 1987, 1988, 1989, 1990, 1991, 1992, 1993 Free Software Foundation, Inc.
License: GPL-2+
Files: getopt.h
Copyright: 1989, 1990, 1991, 1992, 1993 Free Software Foundation, Inc.
License: GPL-2+
Files: contrib/hashcash-request contrib/hashcash-sendmail
Copyright: 2004 Kyle Hasselbacher <kyle@toehold.com>
License: GPL-2+
Files: contrib/hashfork.c
Copyright: 2005 Hubert Chan
License: GPL-2
Files: fip180-1.txt
Copyright: U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology
License: public-domain
The source contains fip180-1.txt, written by the United States government, and
is in the public domain.
License: GPL-2
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
version 2 as published by the Free Software Foundation.
.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
02110-1301 USA.
Comment:
On Debian systems, the complete text of the GNU General Public
License version 2 can be found in `/usr/share/common-licenses/GPL-2'.
License: GPL-2+
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
02110-1301 USA.
Comment:
On Debian systems, the complete text of the GNU General Public
License version 2 can be found in `/usr/share/common-licenses/GPL-2'.
License: LGPL-2.1
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public License
version 2.1 as published by the Free Software Foundation.
.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
.
You should have received a copy of the GNU Lesser General Public
License along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
02110-1301 USA.
Comment:
On Debian systems, the complete text of the GNU Lesser General Public
License version 2.1 can be found in `/usr/share/common-licenses/LGPL-2.1'.
License: BSD-3-clause
Redistribution and use in source and binary forms, with or
without modification, are permitted provided that the following
conditions are met:
.
1. Redistributions of source code must retain the above
copyright notice, this list of conditions and the
following disclaimer.
.
2. Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
.
3. Neither the name of the copyright holder nor the names of
its contributors may be used to endorse or promote
products derived from this software without specific
prior written permission.
.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
License: Cypherpunks-CPL
Cypherpunks anti-License
.
Intent
.
The intent of the Cypherpunks anti-License (CPL) is to inform users that they
are free to use and redistribute the indicated work or any derived or modified
work in any manner they choose. Works distributed under the CPL are in the
Public Domain.
.
Licensing
.
The CPL is not a license, it does not require the user to do or not do
anything; the user does not agree to any terms, because there are no terms, and
the user does not need to do anything to indicate acceptance or rejection of
the CPL.
.
Non Litigation
.
The CPL serves to pledge to the user that the distributors will behave in a
manner consistent with the non-existance of Intellectual Property (IP) laws as
far as they are able. The distributors will not use or participate as far as
they are able to government legal systems to attempt to enforce requests
restricting the use, modifications, or redistribution of the work for
perpetuity. The distributor may prefer to be anonymous to preclude attempts to
coerce them into enforcing IP laws relating to this work against their will.
.
Requests
.
The work may be distributed with some distributor requests in addition to the
CPL. The distributor pledges similarly to not attempt to use IP laws to enforce
these requests.
.
Redistribution
.
Users choosing to redistribute this work may change anything about the work,
including distributing it under a different license, and adding or removing
previous distributors requests.
.
Interpretation
.
The CPL is completely liberal. Here are some examples of implications of this
which are not true for many licenses. The user can redistribute the work or a
derived or modified work
.
* under a different license of their choosing
* with or without source code as they choose
* without acknowledging the distributors or authors
* with false or innaccurate claims about authorship of the work
* advertise without acknowledging the authors
.
Requests can be arbitrary, but are requests only. Example of requests that the
distributor may choose to make:
.
* that improvements to the work be drawn to the distributors attention
* that improvements to the work be released back to the distributor under
the CPL
* that the distributors name not be used to advertise derived works without
the distributors approval
.
Legacy Considerations
.
The distributor may choose to inform the user of his opinion of the IP status
of the work, for example by identifying any IP law restricted aspects such as
the copyright holders of parts or the whole of the work, trademark owners of
trademarks used in the work, potentially applicable patents on algorithms or
ideas contained in the work, but the distributor is not obliged to do so and
takes no responsibility for the accuracy of such information.
.
Background
.
The CPL is written from a mindset which derides the very concept of
Intellectual Property restrictions as being incompatible with a free society.
.
Cryptographically assured anonymity and anonymous use of Internet resources
mean that denizens of cypherspace can ignore copyright, licenses attempting to
control use and distribution of works, and patents on ideas. It is not possible
to enforce IP laws by calls to government legal systems when the flaunter is
strongly anonymous.
.
The enforcement of IP law and anonymity are in direct conflict. To fully
enforce IP laws, anonymity would have to be outlawed. Cypherpunks believe this
would be a bad thing, because control of information imparts power, and
anonymity gives individuals control over disclosure of information about
themselves and their actions.
|