Beefy Boxes and Bandwidth Generously Provided by pair Networks
Just another Perl shrine
 
PerlMonks  

Re: Encrypted Perl?

by Abigail-II (Bishop)
on Feb 06, 2003 at 00:19 UTC ( [id://232994]=note: print w/replies, xml ) Need Help??


in reply to Encrypted Perl?

Sure, just make some modifications to perl source and supply a modified binary. Of course, one could still poke around in /dev/kmem....

Abigail

Replies are listed 'Best First'.
Re: Re: Encrypted Perl?
by premchai21 (Curate) on Feb 06, 2003 at 17:00 UTC

    IANAL, but I have the distinct feeling that if the source for the modifications were not released (update: and the differences were not documented), such would be a violation of perl's license.

      You'd be wrong. The PAL allows this type of thing.

      --- demerphq
      my friends call me, usually because I'm late....

        Missed a piece of the disjunction. Clarified.

        AFAICT, modifications can be carried out, according to the Artistic License (clause 3), only if they are at least one of the following:

        • only used within one organization, which is not the case here;
        • renamed, with differences documented, which is the case I added above;
        • placed in the public domain or otherwise made freely available, which is a bit tricky -- see below;
        • otherwise approved by the copyright holder, which I assume is not the case as such would generally override other licensing anyway.

        "Freely available" is a bit unclear. I take this to mean that the nature of the modifications should be visible, and that not just an altered executable with no documentation or source would suffice; it seems as though it could go either way. However, the other requirement for modification (placing a prominent notice in each modified file stating how and when it was changed), seems as though it would preclude this.

        Clause 4 states that one may distribute the programs in object or executable form if one does at least one of the following:

        • distribute a standard version alongside, which seems to defeat the point;
        • accompany the distribution with machine-readable source, which is my original case;
        • rename the non-standard executables, and clearly document the differences, which is my updated case;
        • get other approval from the copyright holder, which see above.

        Again, it appears somewhat ambiguous -- clause 4 mentions executables, and clause 3 mentions modifications, and they would seem to be disjoint from each other. Depending on the method of implementation, it may hinge on which takes priority over the other, which is not specified anywhere...

        ... so, in other words, I was wrong initially, and from what information I can get might still be wrong, but also might not be. Hmm.

        Update: and yes, I'm wrong again. Node left as a record.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://232994]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others drinking their drinks and smoking their pipes about the Monastery: (5)
As of 2024-04-19 17:55 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found