Abusing Cryptographic Capabilities under CAL

Continuing the discussion from Cryptographic Autonomy License draft v1.0-Beta:

@vanl, I keep returning to this rule, and scratching my head. Might you be able to provide a concrete example of the kind of thing this is meant to prohibit? Maybe in the context of a specific Holo project?

This has been consolidated in draft 2. See the changelog.

1 Like