1997-09-14 - Re: Nightmare Scenario: Public Key Distribution Controlled

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 092cc743b898c86f47f33e9a04c944447f3993ef6a115fa9886be5fe171eaca5
Message ID: <1.5.4.32.19970913235944.00814c1c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-09-14 00:39:23 UTC
Raw Date: Sun, 14 Sep 1997 08:39:23 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Sun, 14 Sep 1997 08:39:23 +0800
To: cypherpunks@toad.com
Subject: Re: Nightmare Scenario: Public Key Distribution Controlled
Message-ID: <1.5.4.32.19970913235944.00814c1c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Does the following provision of the amendment lighten 
Tim's dim glim?

   "§ 2804. Encryption products manufactured and intended
   for use in the United States ...

   (d) USE OF PRIOR PRODUCTS LAWFUL.-- After 
   January 31, 2000, it shall not be unlawful to use any 
   encryption product purchased or in use prior to such 
   date.

[Bottom page 13]

That gives about 450 days to widespread stego, surrept 
onions and backchannels to prepositioned stashes. Max
use prior to.

Or, say to hell with it, coders will forever evade USCoders.







Thread