[License-review] For approval: The Cryptographic Autonomy License (Beta 4)

VanL van.lindberg at gmail.com
Wed Dec 11 01:28:18 UTC 2019


>
> The use or operation of the software is not dependent on user’s customer
> provided data being present...


This is not really correct, if you think about it.

I don't think it is debatable to say that some (most?) software works
differently in the presence of particular data. The subroutines the run are
different; the displayed interface may be different; the state of the
software is *different.* Because the accumulated state is different, the
actual functioning of the software, as experienced by the user, is
different.

I agree that the user has the ability to get back to the place where they
were by re-entering the data and re-doing any associations made. But the
latent potential for the software to work the same way is not the same as
the software actually functioning the exact same way.

(Note that it may not be exactly the same; the CAL limits this to the data
assigned to the Recipient, so as to not to impose licensing on additional
data. But to the extent possible, the CAL tries to make it so that the
software actually works the same way, it doesn't just have the latent
capability to work the same way.).

Hence the binding of the user data provision to the substantially
equivalent *operation* of the Work.




>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensource.org/pipermail/license-review_lists.opensource.org/attachments/20191210/c9a2b2cb/attachment.html>


More information about the License-review mailing list