Heeding Hugh Daniels' call today to set up 1,000 US crypto sites
free of unconstituional export restrictions as provided by the
Bernstein opinion, we invite contributions of unlimited-strengh
encryption programs and/or links to such programs for a new
US section for unrestricted cryptography
--
This judgment http://jya.com/bernstein-9th.htm is
everything we need, but it is not a green light to do
entirely as we please.
For an export of code to be identical to the precedent, the
exported document must be designed to be read by humans,
rather than computers.
We can export
A posting by Cindy Cohn, one of Bernstein's legal team, to cyberia-l,
archived at
http://www.ljx.com/mailinglists/cyberia-l/20266.html
suggests that it would be premature to create such sites.
She writes:
First, the decision is not final for at least 52 days (45 for the
govt to
Given past discussions on building key crackers using FPGAs, I thought this
forum might be of interest to people. - Bill
Date: Thu, 6 May 1999 21:40:26 PDT
From: Michelle Q Wang Baldonado [EMAIL PROTECTED]
Subject: CORRECTION: PARC Forum 5/13 -- Reiner Hartenstein.
"Reconfigurable Computing:
Here's Lance Rose's take on the Bernstein decision:
Elyn
Elyn Wollensky
Programming Development Group
IDG Technology Publishing
900 Third Avenue NYC, NY 10022
voice: +1.212.381.4517 fax: +1.212.381.4501
-Original Message-
From: Lance Rose [ mailto:[EMAIL PROTECTED]
mailto:[EMAIL
I hate to say this, because it sounds "convenient" and "weird", but I
really believe that much source code *is* expression in the first
amendment sense that the 9th circuit held.
It isn't for nothing that for decades, students of computer science
have had beaten into their skulls "remember,
At 12:13 AM 5/7/99 -0700, James A. Donald wrote:
Large numbers of people have been conspicuously breaking this law for a
long time.
Who has been prosecuted?
Charles Booher of San Jose received investigatory attention and subpoena(s)
from the BXA for his website posting of crypto code; I've lost
At 10:37 AM 5/7/99 -0500, Elyn Wollensky wrote:
Here's Lance Rose's take on the Bernstein decision:
Sorry to say, but the 9th Circuit took the dumb approach I mentioned in my
earlier post.
Their whole approach to "source code as speech" is misguided -
unless we are talking about
people
[CC's to lists I'm not on trimmed; feel free to forward this as long
as you CC: me on forwards..]
Peter Junger has a list specifically for discussing the
source-code-as-speech issue; for more info on the list, see
http://samsara.law.cwru.edu/~sftspch/
The fact that source code is an
Elyn Wollensky wrote:
-Original Message-
From: Lance Rose [ mailto:[EMAIL PROTECTED]
mailto:[EMAIL PROTECTED] ]
Sent: Friday, May 07, 1999 8:58 AM
To: Elyn Wollensky
Cc: [EMAIL PROTECTED]
Subject: Re: FW: Bernstein Opinion Up
[snip]
- the fact
that we reach for the easiest, broad
Mondex isn't dead in Canada it seems. Though I've had no word on the
NBTel/Royal Bank partnership in New Brunswick, it appears that yet another
trial will roll out, this time in Sherbrooke Quebec.
-M Taylor
Source: www.mondex.ca
SHERBROOKE (April 20, 1999) - Mondex Canada
announced today that
I'd like to take this argument one step further. It might well be possible
with existing technology to write a computerprogram that converted a plain
English description of an algorithm into C. Natural language understanding
programs do best with a limited vocabulary and clear semantics, as would
Somewhere, Doug Barnes is smiling...
Cheers,
RAH
--- begin forwarded text
Date: Fri, 07 May 1999 16:30:01 +0100
To: e$@vmeng.com, [EMAIL PROTECTED], [EMAIL PROTECTED]
From: Rachel Willmer [EMAIL PROTECTED]
Subject: [ANN] Intertrader announces Mondex Internet Cafe at Bank of
Scotland
Sender:
Bill Sommerfeld [EMAIL PROTECTED] wrote:
A posting by Cindy Cohn, one of Bernstein's legal team, to cyberia-l,
archived at
http://www.ljx.com/mailinglists/cyberia-l/20266.html
suggests that it would be premature to create such sites.
She writes:
First, the decision is not
At 5:21 PM -0700 5/6/99, James A. Donald wrote:
The interesting question is of course whether the Bernstein
decision applies only to printed documents, and not web
pages.
There is certainly nothing in the opinion restricting it to
paper. Web pages are just as much publication,
I agree. But the next (legally and commercially) exciting question is to
what extent this works for object code
On 7 May 1999, Perry E. Metzger wrote:
I hate to say this, because it sounds "convenient" and "weird", but I
really believe that much source code *is* expression in the first
Of course PGP is available for the Mac. There are some free DES utilities
and Secure Delete. You might be interested in
http://nswt.tuwien.ac.at/htdocs/baudoin-goodie-hints/mac/secure_edit.html
I would also call your attention to my http://ciphersqaber.gurus.com that
tells how to write you own
At 03:23 PM 5/7/99 -0400, Matt Blaze wrote:
But in the case of source code, there is no difference between a
"photograph" of source code and the actual code itself.
But, what if one created a machine that could render an exact duplicate pot (or one
that at least *looks like* an exact duplicate)
--
At 12:13 AM 5/7/99 -0700, James A. Donald wrote:
Large numbers of people have been conspicuously breaking
this law for a long time.
At 09:04 AM 5/7/99 -0700, Greg Broiles wrote:
Charles Booher of San Jose received investigatory attention
and subpoena(s) from the BXA for his website
At 02:20 PM 5/7/99 -0400, Arnold G. Reinhold wrote:
I'd like to take this argument one step further. It might well be possible
with existing technology to write a computerprogram that converted a plain
English description of an algorithm into C. Natural language understanding
programs do best
At 01:21 PM 5/7/99 -0700, Martin Minow wrote:
The appeals court decision, at the web at
http://www.ce9.uscourts.gov/web/newopinions.nsf/f606ac175e010d64882566eb00
65811
8/febd2452a8a4d79b8825676900685b71?OpenDocument
contains source of the core of Bernstein's "Sunffle" program. (Search
for
In a previous email, I commented on problems in the Triple-DES
implementation in Schlumberger's Java Card (which is called the
"Cyberflex Access Card").
Apparently Schlumberger has addressed some of these problems
with a new version which has an ATS (answer to reset) with a
hex string ending in
22 matches
Mail list logo