/usr/share/doc/hashcash/copyright is in hashcash 1.21-2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 | This package was debianized by Hubert Chan <hubert@uhoreg.ca> on
Sat, 27 Dec 2003 15:23:30 -0500.
It was downloaded from http://www.hashcash.org/
Copyright Holder: Adam Back <adam@cypherspace.org>
License:
The source contains getopt.c and getopt.h, which are copyright by the FSF, and
licensed under the GPL.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
On Debian systems, the full text of the GPL can be found at
/usr/share/common-licenses/GPL.
The source contains fip180-1.txt, written by the United States government, and
is in the public domain.
The hashcash-sendmail and hashcash-request programs in the examples directory
are copyright Kyle Hasselbacher, and licensed under the GPL.
The hashfork.py program in the examples directory was written by Hubert Chan,
and is in the public domain.
The rest of the software is licensed under your choice of (in the upstream
author's preference):
- Cypherpunks CPL (Cypherpunks anti-License)
- public domain
- modified BSD (without advertising clause)
- LGPL 2.1
- GPL 2
The text of the Cypherpunks CPL is included below.
On Debian systems, the BSD license can be found at
/usr/share/common-licenses/BSD, the LGPL at /usr/share/common-licenses/LGPL,
and the GPL at /usr/share/common-licenses/GPL.
The upstream author makes the following comments and requests. They are not
licensing requirements:
- If you have to make changes to make this library work for your system or
application it would be useful if you could tell me what you had to
do, and optionally send me the source changes so I can include them
or update the library. The aim is to make a practically useful
library.
- It would be useful if you could inform me if you use or distribute
hashcash. The intent here is to give me feedback and insight into the
areas of application which people find useful in practice.
- If you are unclear on how to use hashcash there is a FAQ here:
http://www.hashcash.org/faq.html. If that doesn't answer your question or
doesn't apply to your usage, feel free to discuss in email.
- It may help the deployment of hashcash as an anti-spam system if different
systems based on hashcash were interoperable as far as that makes
sense for your system. To this end the FAQ
http://www.hashcash.org/faq.html and Internet-Draft
http://www.hashcash.org/draft-hashcash.txt document my
thoughts in this area. See also the hashcash home page
http://www.hashcash.org and paper there as I update with links to deployed
systems which it might be useful for you to interoperate with.
Cypherpunks anti-License
Intent
The intent of the Cypherpunks anti-License (CPL) is to inform users that they
are free to use and redistribute the indicated work or any derived or modified
work in any manner they choose. Works distributed under the CPL are in the
Public Domain.
Licensing
The CPL is not a license, it does not require the user to do or not do
anything; the user does not agree to any terms, because there are no terms, and
the user does not need to do anything to indicate acceptance or rejection of
the CPL.
Non Litigation
The CPL serves to pledge to the user that the distributors will behave in a
manner consistent with the non-existance of Intellectual Property (IP) laws as
far as they are able. The distributors will not use or participate as far as
they are able to government legal systems to attempt to enforce requests
restricting the use, modifications, or redistribution of the work for
perpetuity. The distributor may prefer to be anonymous to preclude attempts to
coerce them into enforcing IP laws relating to this work against their will.
Requests
The work may be distributed with some distributor requests in addition to the
CPL. The distributor pledges similarly to not attempt to use IP laws to enforce
these requests.
Redistribution
Users choosing to redistribute this work may change anything about the work,
including distributing it under a different license, and adding or removing
previous distributors requests.
Interpretation
The CPL is completely liberal. Here are some examples of implications of this
which are not true for many licenses. The user can redistribute the work or a
derived or modified work
* under a different license of their choosing
* with or without source code as they choose
* without acknowledging the distributors or authors
* with false or innaccurate claims about authorship of the work
* advertise without acknowledging the authors
Requests can be arbitrary, but are requests only. Example of requests that the
distributor may choose to make:
* that improvements to the work be drawn to the distributors attention
* that improvements to the work be released back to the distributor under
the CPL
* that the distributors name not be used to advertise derived works without
the distributors approval
Legacy Considerations
The distributor may choose to inform the user of his opinion of the IP status
of the work, for example by identifying any IP law restricted aspects such as
the copyright holders of parts or the whole of the work, trademark owners of
trademarks used in the work, potentially applicable patents on algorithms or
ideas contained in the work, but the distributor is not obliged to do so and
takes no responsibility for the accuracy of such information.
Background
The CPL is written from a mindset which derides the very concept of Intellectual Property restrictions as being incompatible with a free society.
Cryptographically assured anonymity and anonymous use of Internet resources
mean that denizens of cypherspace can ignore copyright, licenses attempting to
control use and distribution of works, and patents on ideas. It is not possible
to enforce IP laws by calls to government legal systems when the flaunter is
strongly anonymous.
The enforcement of IP law and anonymity are in direct conflict. To fully
enforce IP laws, anonymity would have to be outlawed. Cypherpunks believe this
would be a bad thing, because control of information imparts power, and
anonymity gives individuals control over disclosure of information about
themselves and their actions.
|