From: jimbell@pacifier.com (jim bell)
To: Scott Brickner <sjb@universe.digex.net>
Message Hash: c7d7c2337fbad7f449f25122c461749b3d31ea84ef7d12a4ed39f0f133a92c43
Message ID: <m0tFpbT-0008yaC@pacifier.com>
Reply To: N/A
UTC Datetime: 1995-11-15 22:13:15 UTC
Raw Date: Thu, 16 Nov 1995 06:13:15 +0800
From: jimbell@pacifier.com (jim bell)
Date: Thu, 16 Nov 1995 06:13:15 +0800
To: Scott Brickner <sjb@universe.digex.net>
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
Message-ID: <m0tFpbT-0008yaC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain
>jim bell writes:
>>>I think it's 121.1, Category XIII paragraph (b) item (5):
>>>"Ancillary equipment specifically designed or modified for paragraphs (b)
>>>(1), (2), (3), (4) and (5) of this category;"
>>
>>Question: What makes computers in general NOT describable by such a
>>paragraph?!?
>
>The referenced paragraphsdescribe cryptographic hardware, software and
>technical data. Computers in general are not "specifically designed"
>as cryptographic equipment.
Great! Then you must merely ensure that there is at least one
(non-encryption) program around that can use the same hooks.
Return to November 1995
Return to “Simon Spero <ses@tipper.oit.unc.edu>”