1996-08-04 - Re: ITAR

Header Data

From: “Deranged Mutant” <WlkngOwl@unix.asb.com>
To: koontz@netapp.com (Dave Koontz)
Message Hash: 506ca8108004511c8e119b833e299640dff0b37a0ce002dc70e7b91a187b2363
Message ID: <199608040339.XAA24208@unix.asb.com>
Reply To: N/A
UTC Datetime: 1996-08-04 05:35:55 UTC
Raw Date: Sun, 4 Aug 1996 13:35:55 +0800

Raw message

From: "Deranged Mutant" <WlkngOwl@unix.asb.com>
Date: Sun, 4 Aug 1996 13:35:55 +0800
To: koontz@netapp.com (Dave Koontz)
Subject: Re: ITAR
Message-ID: <199608040339.XAA24208@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain


On  2 Aug 96 at 16:50, Dave Koontz wrote:

> How about exporting programs, that when executed generate source code for
> encryption algorithms?

Nope.

There already are such things.  Make a .zip archive and convert it 
into a self-extracting program.

Rob
 
---
No-frills sig. Befriend my mail filter by sending a message with the subject "send help"
Key-ID: 5D3F2E99 1996/04/22 wlkngowl@unix.asb.com (root@magneto)
Send a message with the subject "send pgp-key" for a copy of my key.





Thread