alter its state, making it virtually impossible for unauthorized users to explore data relationships in a manner consistent with the terms of the covered work in source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional