From: Matthew James Sheppard <Matthew.Sheppard@Comp.VUW.AC.NZ>
To: cypherpunks@toad.com
Message Hash: 60e1452bc615618200e9a35618fc57685681019ea06507393014a7e38f8dcd08
Message ID: <199511250017.NAA16018@paramount.comp.vuw.ac.nz>
Reply To: <Pine.BSD.3.91.951124054104.12402A-100000@usr4.primenet.com>
UTC Datetime: 1995-11-25 00:25:13 UTC
Raw Date: Sat, 25 Nov 1995 08:25:13 +0800
From: Matthew James Sheppard <Matthew.Sheppard@Comp.VUW.AC.NZ>
Date: Sat, 25 Nov 1995 08:25:13 +0800
To: cypherpunks@toad.com
Subject: Re: "lack" of export control rules
In-Reply-To: <Pine.BSD.3.91.951124054104.12402A-100000@usr4.primenet.com>
Message-ID: <199511250017.NAA16018@paramount.comp.vuw.ac.nz>
MIME-Version: 1.0
Content-Type: text/plain
The shadowy figure took form and announced "I am attila and I say ...
> On Thu, 23 Nov 1995, sameer wrote:
> a> The feds have never established a general policy.
>
> in other words, business as usual with the Feds. If there is no "book"
> on what is or is not legal v/v ITAR, and the agency responsible will not
> communicate, it empirically says: "...well, be reasonable to meet the
> intent of the law, but we will not tell you what is really expected;
> however, if, in the futute, we decide what we really want, we will bust
> you if you did not fully comply despite your good intentions --and, if
> that does not fly, we'll charge you with conspiracy...."
Just had an idea for Netscapes case. If we suppose that the ITAR
governors ever managed to agree on a purely electronic based, export
controlled distribution method then Netscape can write a Java applet
or LiveScript to perform the task. This would mean a *click here to
download* interface and bypass the obfuscated process that dogs MIT
pgp.
--
<URL:http://www.comp.vuw.ac.nz/~matt>
|~ |~
|~ o| o|
('< o|
,',)
''<<
---""---
Return to November 1995
Return to “Matthew James Sheppard <Matthew.Sheppard@Comp.VUW.AC.NZ>”