![]() ![]() ![]() With every copy of Your Product that You make and distributeĪnd You make all such copies of Your Product available to (i) You include the complete source code of Your Product ThisĬondition can be met in one or both of the following ways: ![]() The complete source code of Your Product must be freelyĪnd publicly available (for exceptions, see Section III.2)Īt least until You cease to distribute Your Product. May be reported or where support for Your Product may beĪvailable or otherwise attempt to indicate that the domain Product may be obtained or where bugs found in Your Product That might suggest that it is where information about Your That forwards to the domain name ) in a manner Product, etc.) must not present any Internet addressĬontaining the domain name (or any domain name Your Product (and any associated materials, e.g., theĭocumentation, the content of the official web site of Your "About" window, etc.) and the way in which Your Product will Interface (if there is any) of Your Product (e.g., an Of the cases mentioned above in this paragraph,Īnd You may freely choose the location within the user Portion of Your Product, phrase "Portions of this productĪre based in part on TrueCrypt, freely available at You included in Your Product constitutes only a minor Alternatively, if This Product or its portion (if technically feasible) and contained in itsĭocumentation. Phrase "Based on TrueCrypt, freely available at TrueCrypt Foundation", "This is a TrueCrypt FoundationĬ. License: "A TrueCrypt Foundation Release", "Released by The following phrases must be removed from Your ProductĪnd from any associated materials, except the text of this (logos, icons, etc.) must be removed from Your Product (orįrom Your modified version of This Product) and from anyī. ![]() (including, but not limited to, the non-textual logoĬonsisting primarily of a key in stylized form) or Included in (or attached to) Your Product (and in/toĪssociated materials) must not incorporate and must not beĬonfusingly similar to any of the TrueCrypt logos Your Product and from any associated materials. (e.g., True-Crypt, True Crypt, TruKrypt, etc.)Īll occurrences of the name TrueCrypt that could reasonablyīe considered to identify Your Product must be removed from TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) norĪny other names confusingly similar to the name TrueCrypt This Product) must not contain the name TrueCrypt (forĮxample, the following names are not allowed: TrueCrypt, The name of Your Product (or of Your modified version of Thereof in another product (thus forming Your Product, unlessĭefined otherwise in Chapter I), and You may use (for non-Ĭommercial and/or commercial purposes), copy, and/or distributeĪ. (thus forming Your Product), include This Product or portions Product), derive new works from This Product or portions thereof Of this License, You may modify This Product (thus forming Your This Chapter (III) are met (for exceptions, see Section III.2)Īnd if You comply with all other applicable terms and conditions If all conditions specified in the following paragraphs in Modification, Derivation, and Inclusion in Other Products I put the full license in a pastebin taken from the License.txt included in the TrueCrypt 7.1a Source available here. freely provide the source for all your modifications if you distribute your source,.state that it is based on TrueCrypt freely available at ,.do not claim it is a release by the TrueCrypt Foundation,.do not call it TrueCrypt (or base the name off of TrueCrypt).My non-lawyer interpretation of the license is that you do have permission to modify it, provided you: Here's the relevant section of the license. To get rid of the complicated TrueCrypt license, they plan to reimplement those parts with questionable license conditions and release the software dual-licensed under both an common open source license and a commercial version ( German news story). Nevertheless, there is a team in Switzerland which promised to continue working on TrueCrypt under the name TrueCryptNext.Įdit: Now there is the company Sirrix from Germany which wants to make a TrueCrypt fork called TrustedDisk. A fork of the TrueCrypt project might not be legally possible without the permission of the original TrueCrypt authors, who prefer to remain anonymous for now. These conditions prevented the Open Source Initiative from recognizing it as an open-source license. While the intention of the authors seemed to be to write a share-alike license similar in spirit to the GPL, the license has a few quite unorthodox passages which can be interpreted in a way which puts unreasonable conditions on a fork. The main obstacle of a TrueCrypt fork is the non-standard TrueCrypt license. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |