No no no... if the NSA creates specific algorithms used in components and modules in Linux, and the source algorithm/hash isn’t revealed, it’s contrary to GPLv2. That’s what I meant.
8 posted on 07/26/2013 10:31:41 AM PDT by rarestia
(It's time to water the Tree of Liberty.)