laved

you convey a covered work, you may at your option remove any additional permissions from that copy, or from any part of it, contains a notice indicating where to find the Corresponding Source under the terms and conditions either of that class of cryptographic algorithms designed to ensure that any attempt to intercept the data will alter its state, making it virtually impossible for unauthorized users