Re: idea, cast as used in PGP

1999-04-30 Thread Michael Motyka
Further, if there is a chain of make, sell, use, the assignee may prosecute an infringement case at any point in the chain. IOW, if you make an infringing product and sell it to Big Blue, the fact that you are the original infringer does not absolve IBM from liability. In choosing an infringer

Re: idea, cast as used in PGP

1999-04-30 Thread Michael Motyka
Ben Kavanagh wrote: > > It depends on how the patent is defined. The patent might explicitly > say used for protecting data on stored media. If you can find a way > to say you're using it in a way not described by the patent then you > have a good chance of getting away with it. Bottom line is yo

Re: Intel & Symantec v. ZKS?

1999-04-30 Thread alano
> > > Symantec agreed that the program fit its definition of a type of malicious > > > program known as a Trojan horse, so it included the software in its > > > continually updated list of dangerous programs, which include viruses, > > > that cause warnings to pop up on its customers' computers. >

Re: idea, cast as used in PGP

1999-04-30 Thread Ben Kavanagh
It depends on how the patent is defined. The patent might explicitly say used for protecting data on stored media. If you can find a way to say you're using it in a way not described by the patent then you have a good chance of getting away with it. Bottom line is you have to read the patent to s

PLANNING May 8 SF Cypherpunks Meeting, Berkeley/Oakland

1999-04-30 Thread Bill Stewart
The monthly SF Bay Area Cypherpunks Meeting will be Saturday May 8. We're looking for speakers and agenda items for the meeting. Because the IEEE Crypto conference will be at the Claremont starting the following Monday, we'll be meeting somewhere near there. Th

idea, cast as used in PGP

1999-04-30 Thread Mike Stay
I think CAST-256 is the default symmetric encryption used in PGP 5.x, 6.x freeware; the openPGP draft supports a bunch of other algs including IDEA, which is patented. Could we charge for a product that simply uses those algorithms to get the secret key from the keyring (we're not encrypting anyt

Re: How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Adam Shostack
| > [...continuing later...] | > | > (6) A launch vehicle or payload shall not, by reason of the launching | > of such vehicle, be considered an export for purposes of this | > subchapter... | | I believe that the standard reply is that it's not the "launch" | that makes it an export

Re: How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Michael Motyka
Mike, More of a cypherpunks topic... They'd probably say that the intent was to land the rockets on foreign soil and constituted an export. Besides, consider the press: US Fires Rockets on Mexico, War Declared Sporadic Firing on Mexican Front, 4 killed, 37 Wounded President Calls Up Additional

Re: How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Theodore Y. Ts'o
Date: Fri, 30 Apr 1999 12:51:49 -0400 (EDT) From: "Michael Froomkin - U.Miami School of Law" <[EMAIL PROTECTED]> If you read the regs, it makes it legal to put the crypto in orbit. It's still an offense when it lands abroad. So when the rockets go up, you DO care where they come

Re: How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Michael Froomkin - U.Miami School of Law
Yes, it's funny, but it's also misleading. If you read the regs, it makes it legal to put the crypto in orbit. It's still an offense when it lands abroad. So when the rockets go up, you DO care where they come down... Been trying to get that one fixed for *years*. -Digicrime's "Big MouthPiece

Re: How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Michael H. Warfield
This needs to be in an FAQ somewhere... Mike Stay enscribed thusly: > Quoting http://www.digicrime.com/itar.html : > > "Our crack team of legal advisors has discovered a loophole in the ITAR > export restrictions on cryptographic devices from the US. Specifically, > it now appears that c

Re: How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Mordy Ovits
Remember when people were launching rockets with the fins made of win95 CDs? The "technology" is already there, and the proof of concept has been tested on dispensable items. Mike Stay wrote: > > Quoting http://www.digicrime.com/itar.html : > > "Our crack team of legal advisors has discovered

How to export strong crypto & still satisfy ITAR

1999-04-30 Thread Mike Stay
[This is silly, IMHO, but I decided to forward it anyway. I don't take it the least bit seriously. Of course, digicrime.com largely consists of such elaborate jests anyway... --Perry] Quoting http://www.digicrime.com/itar.html : "Our crack team of legal advisors has discovered a loophole in the

KeyNote v2 trust management toolkit now available for beta testing

1999-04-30 Thread Matt Blaze
We are pleased to announce the beta release of the KeyNote v2 Trust Management Toolkit and Reference Implementation for BSD Unix and Linux. The toolkit was developed by Angelos Keromytis of the University of Pennsylvania. KeyNote is a small, flexible trust management system designed to be espec