From: jimbell@pacifier.com (jim bell)
To: cypherpunks@toad.com
Message Hash: a60e0492aacd9a1ee08846151d72cb8494337c41df93699051e94341b4c738c3
Message ID: <m0tFbde-0008zsC@pacifier.com>
Reply To: N/A
UTC Datetime: 1995-11-15 07:10:54 UTC
Raw Date: Wed, 15 Nov 1995 15:10:54 +0800
From: jimbell@pacifier.com (jim bell)
Date: Wed, 15 Nov 1995 15:10:54 +0800
To: cypherpunks@toad.com
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
Message-ID: <m0tFbde-0008zsC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain
> > >I think it's 121.1, Category XIII paragraph (b) item (5):
> > >"Ancillary equipment specifically designed or modified for paragraphs (b)
> > >(1), (2), (3), (4) and (5) of this category;"
> >
> > Question: What makes computers in general NOT describable by such a
> > paragraph?!?
>
>"specifically designed"?
>
>nathan
That makes it easy: Just make sure that you also write a compressor or
filter program with similar compatibility, and nobody can argue that the
hooks were SPECIFICALLY DESIGNED for encryption.
Return to November 1995
Return to “jimbell@pacifier.com (jim bell)”
1995-11-15 (Wed, 15 Nov 1995 15:10:54 +0800) - Re: NSA, ITAR, NCSA and plug-in hooks. - jimbell@pacifier.com (jim bell)