include claims that would be infringed only as a consequence of using peer-to-peer transmission, provided you inform other peers where the list is generated from.<br><br> While the official instances may be used separately