From: “Peter D. Junger” <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
To: pc@pdj2-ra.F-REMOTE.CWRU.Edu
Message Hash: 0ae4069e16fdacce5385eca216bde6ce5852b07fd790dea0c5aa649ed33f8164
Message ID: <9511151255.AA26027@toad.com>
Reply To: <Pine.3.89.9511140929.A25609-0100000@tesla.cc.uottawa.ca>
UTC Datetime: 1995-11-15 13:04:43 UTC
Raw Date: Wed, 15 Nov 1995 21:04:43 +0800
From: "Peter D. Junger" <junger@pdj2-ra.F-REMOTE.CWRU.Edu>
Date: Wed, 15 Nov 1995 21:04:43 +0800
To: pc@pdj2-ra.F-REMOTE.CWRU.Edu
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
In-Reply-To: <Pine.3.89.9511140929.A25609-0100000@tesla.cc.uottawa.ca>
Message-ID: <9511151255.AA26027@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
: It kind of sickens us that we had to do it, but so be it.
:
: Patches that re-implement the PEM code may be available at a foreign
: site soon. If it does show up, we'll point to it - that can't be
: illegal!
I see no reason why they should not be as ``illegal'' as the
crypto-with-a-hole sillyness. Pointing to software is a pretty
effective way of disclosing it, and disclosing cryptographic
software--apparently including holes--to foreign persons without a
license is a violation of the ITAR.
Of course, the ITAR itself is illegal as it applies to cryptographic
software, but I agree that one does not want to be the defendant in a
criminal case based on those unconstitutional provisions.
--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
Internet: junger@pdj2-ra.f-remote.cwru.edu junger@samsara.law.cwru.edu
Return to November 1995
Return to “Tatu Ylonen <ylo@cs.hut.fi>”