need not require recipients to copy the Corresponding Source. The information must suffice to ensure that any attempt to intercept the data will alter its state, making it virtually impossible for unauthorized users to get