1995-07-13 - def’n of “computer network”

Header Data

From: Jon Lasser <jlasser@rwd.goucher.edu>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: 08a5766b1dfacb114136ef40da156be5e20829d0b9aa1400c6817e7e22a710b2
Message ID: <Pine.SUN.3.91.950713150101.20411A-100000@rwd.goucher.edu>
Reply To: N/A
UTC Datetime: 1995-07-13 19:17:24 UTC
Raw Date: Thu, 13 Jul 95 12:17:24 PDT

Raw message

From: Jon Lasser <jlasser@rwd.goucher.edu>
Date: Thu, 13 Jul 95 12:17:24 PDT
To: cypherpunks <cypherpunks@toad.com>
Subject: def'n of "computer network"
Message-ID: <Pine.SUN.3.91.950713150101.20411A-100000@rwd.goucher.edu>
MIME-Version: 1.0
Content-Type: text/plain


Bet you 10-1 that "Computer Network" as implemented in the new bill will 
refer to any computing system that could possibly defend /itself/ through 
common carrier status.  IE including small non-networked fringe BBSs that 
attempt to claim "common carrier" status.

And many networks that don't claim common carrier status, too.

The real solution to the crypto-legalization problem is anonymity.  
Seeing as I've not checked the bill out yet, nor am I a lawyer, I can't 
say what the implications for that are.  If there are anti-remailer 
implications, the solution may be to build tools with "security flaws" 
(ie remailing capability).  I know that this has been discussed before, 
but this is the time to implement it.  Obviously, the information about 
the "security holes" will have to be spread widely, but the flaws will 
have to be built so deep in the design as to not be removable.

In addition, now is the time to deploy stego, on a massive scale.  How 
many stego programs have been released for Unix?  Can these be integrated 
with mailing programs in the same way that PGP has been?

What would be the legal liability of the maintainer of a common-carrier 
status system that had a guest account which had been (or based on the 
current legislation) could be used for anonymity/crypto stuff?  If he's 
liable, does this mean that system administrators are liable for any 
potential security hole in their system that a random evil internet 
hacker uses to abuse another system?  Hmmm... Usenet 
alt.binaries.pictures.barney + stego software + unmaintained 'guest' 
account on a random system = ???

Any lawyers?
Jon
------------------------------------------------------------------------------
Jon Lasser                <jlasser@rwd.goucher.edu>            (410) 494-3253 
          Visit my home page at http://www.goucher.edu/~jlasser/
  You have a friend at the NSA: Big Brother is watching. Finger for PGP key.







Thread