John says:
Next time, before disagreeing with someone:
a) Please read what he actually wrote, and
b) Don't quote snippets out of context.
Three sentences later, at the end of the paragraph that
began as quoted above, I explicitly pointed out that
cellphone transmissions are a more-protected sp
y the wireless
scandal a few years back when some Democrat partisan intercepted
communications of Republican leadership in Florida, then talked. The simple
act of interception was illegal.
Will Rodger
-
The Cryptography Mailing
David says:
>I spent a lot of time talking to lawyers at UC Berkeley and
>elsewhere about this very issue, and there appears to be a real
>but very-hard-to-quantify risk -- a risk to scientists that should
>not be lightly dismissed.
>
>Given this risk, I've decided I cannot afford to work any fu
Arnold says:
>You can presumably write your own programs to decrypt your own files. But
>if you provide that service to someone else you could run afoul of the law
>as I read it. The DMCA prohibits trafficking in technology that can be
>used to circumvent technological protection measures. Th
self: were it peacetime you'd have a pretty clear case of
receiving stolen property. Add to that certain trade-secret laws in various
of the 50 United States, and you could do a long time in the slammer over
this...
Will Rodger
---
(and named sources) missing from the story, it looks like
nothing so much an account of a standard, legitimate inquiry from law
enforcement.
Will Rodger
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
I wrote:
>We also know that virus scanners are remarkably bad at picking up and
>stopping new malware. If they were any good at all, new viri and Trojans
>would not spread the way they do.
Declan said:
>That's a fair statement, since the average Windows user either doesn't use
>antivirus war
anners?
I am quite certain that Ted Bridis got his story right. I am less certain
that his sources told him the truth.
Will Rodger
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
at hardware company wants to sell a hobbled computer whose
main purpose is to protect someone else's line of business?
Hollings will make more enemies than he cares to think of if he proceeds
with this dead-on-arrival bill.
Will Rodger
Washington, DC
-