1995-11-15 - Re: NSA, ITAR, NCSA and plug-in hooks.

Header Data

From: jimbell@pacifier.com (jim bell)
To: cypherpunks@toad.com
Message Hash: a60e0492aacd9a1ee08846151d72cb8494337c41df93699051e94341b4c738c3
Message ID: <m0tFbde-0008zsC@pacifier.com>
Reply To: N/A
UTC Datetime: 1995-11-15 07:10:54 UTC
Raw Date: Wed, 15 Nov 1995 15:10:54 +0800

Raw message

From: jimbell@pacifier.com (jim bell)
Date: Wed, 15 Nov 1995 15:10:54 +0800
To: cypherpunks@toad.com
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
Message-ID: <m0tFbde-0008zsC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


> > >I think it's 121.1, Category XIII paragraph (b) item (5):
> > >"Ancillary equipment specifically designed or modified for paragraphs (b)
> > >(1), (2), (3), (4) and (5) of this category;"
> > 
> > Question:  What makes computers in general NOT describable by such a
> > paragraph?!?
>
>"specifically designed"?
>
>nathan

That makes it easy:  Just make sure that you also write a compressor or
filter program with similar compatibility, and nobody can argue that the
hooks were SPECIFICALLY DESIGNED for encryption.






Thread