From: Steve Reid <steve@edmweb.com>
To: cypherpunks.toad.com@miron.vip.best.com
Message Hash: 8bb441e2fda46a09167224920d80b97c38d8c16a995ef0b912e3506886512d41
Message ID: <Pine.BSF.3.91.960408224407.8748C-100000@kirk.edmweb.com>
Reply To: <199604081656.MAA00598@miron.vip.best.com>
UTC Datetime: 1996-04-09 10:19:59 UTC
Raw Date: Tue, 9 Apr 1996 18:19:59 +0800
From: Steve Reid <steve@edmweb.com>
Date: Tue, 9 Apr 1996 18:19:59 +0800
To: cypherpunks.toad.com@miron.vip.best.com
Subject: Re: "Contempt" charges likely to increase
In-Reply-To: <199604081656.MAA00598@miron.vip.best.com>
Message-ID: <Pine.BSF.3.91.960408224407.8748C-100000@kirk.edmweb.com>
MIME-Version: 1.0
Content-Type: text/plain
> In the absence of cryptanalysis, the output of a symetric cipher
> looks like random bytes.
> Every one should have a hardware RNG on their computer.
> "I am sorry your honor, that is a file of random numbers that I
> was using to check the output of my RNG."
> Or
> "I am sorry your honor that is a one-time pad I was planning
> to use."
But, would the average jury understand what a RNG is? The prosecution
would probably argue that "It's a tool used by terrorists and child
pornographers so that they can create 'codes' to communicate with each
other". If they say that, they could probably even supress any
explaination of what a RNG actually is, by claiming that it's "to
dangerous to allow into public record". The Phrack E911 document was
supressed in that way.
In some countries I could see people being charged with an offence just
for having a RNG... The output looks encrypted, and I heard that in France
(and other countries) it is illegal to create anything that even *looks*
encrypted. :(
Disclaimer: IANAL
Return to April 1996
Return to “Steve Reid <steve@edmweb.com>”