From: “Deranged Mutant” <WlkngOwl@unix.asb.com>
To: koontz@netapp.com (Dave Koontz)
Message Hash: 506ca8108004511c8e119b833e299640dff0b37a0ce002dc70e7b91a187b2363
Message ID: <199608040339.XAA24208@unix.asb.com>
Reply To: N/A
UTC Datetime: 1996-08-04 05:35:55 UTC
Raw Date: Sun, 4 Aug 1996 13:35:55 +0800
From: "Deranged Mutant" <WlkngOwl@unix.asb.com>
Date: Sun, 4 Aug 1996 13:35:55 +0800
To: koontz@netapp.com (Dave Koontz)
Subject: Re: ITAR
Message-ID: <199608040339.XAA24208@unix.asb.com>
MIME-Version: 1.0
Content-Type: text/plain
On 2 Aug 96 at 16:50, Dave Koontz wrote:
> How about exporting programs, that when executed generate source code for
> encryption algorithms?
Nope.
There already are such things. Make a .zip archive and convert it
into a self-extracting program.
Rob
---
No-frills sig. Befriend my mail filter by sending a message with the subject "send help"
Key-ID: 5D3F2E99 1996/04/22 wlkngowl@unix.asb.com (root@magneto)
Send a message with the subject "send pgp-key" for a copy of my key.
Return to August 1996
Return to ““Deranged Mutant” <WlkngOwl@unix.asb.com>”
1996-08-04 (Sun, 4 Aug 1996 13:35:55 +0800) - Re: ITAR - “Deranged Mutant” <WlkngOwl@unix.asb.com>