----- Forwarded message from Dave Farber <[EMAIL PROTECTED]> -----

From: Dave Farber <[EMAIL PROTECTED]>
Date: Tue, 03 Feb 2004 15:26:52 -0500
To: [EMAIL PROTECTED]
Subject: [IP] Are terrorists using encryption to cloak
  their secrets?
X-Mailer: munch
X-Mailer: QUALCOMM Windows Eudora Version 6.0.2.0
Reply-To: [EMAIL PROTECTED]


Delivered-To: [EMAIL PROTECTED]
Date: Tue, 03 Feb 2004 13:44:02 -0500
From: Declan McCullagh <[EMAIL PROTECTED]>
---

Date: Mon,  2 Feb 2004 10:20:36 -0500
From: "Matthew S. Hamrick" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Are Terrorists Using Crypto?

Once again I've had to defend the domestic use of encryption technology. My
latest "opinion" is at
http://www.cryptonomicon.net/modules.php?name=News&file=article&sid=645 . I
don't know if it's of any value to either of you guys, but I thought I would
pass it along anyway.

-Matt H.

-- 
One Ringtone to rule them all, one Carrier to find them,
One Phone to bring them all and to the Service Contract bind them.

__

-------------------------------------
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

----- End forwarded message -----
-- Eugen* Leitl <a href="http://leitl.org";>leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org         http://nanomachines.net

Reply via email to