From: apteryx@super.zippo.com (Mark Heaney)
To: cypherpunks@toad.com
Message Hash: 0eabf7064096bf5d167b129e42f11cdcf3e6760fb325ddfa9bd31ef81bb5c0cf
Message ID: <3267823e.85486825@super.zippo.com>
Reply To: N/A
UTC Datetime: 1996-10-11 20:53:12 UTC
Raw Date: Fri, 11 Oct 1996 13:53:12 -0700 (PDT)
From: apteryx@super.zippo.com (Mark Heaney)
Date: Fri, 11 Oct 1996 13:53:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Why not PGP?
Message-ID: <3267823e.85486825@super.zippo.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Jim Ray wrote:
>Rollo Silver wrote:
[snip]
>> 2. Suppose someone writes a program Z that has no expicit crypto code in
>> it, but has hooks for installing one or another version of PGP. Given a
>> copy of Z, someone in this country could install PGP he got from MIT,
>> whereas someone in Europe could install the international version.
>> Would export of Z violate ITAR restrictions?
>
>Yes.
>JMR
Does this mean that exporting Private Idaho, PGPfront, WinPGP, etc. would
be a violation of ITAR because they function only when combined with PGP
and contain "hooks" for using PGP?
I don't recall any restrictions on who could download these files from
their host sites.
Mark
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQB1AwUBMl6ZSN36bir1/qfZAQGUWAMAmbh59CK2wMBt/AVCEcwoiknVgIYMNRmS
B2s4YJyvq5QQnUkynUcMSU17vltRhwQyapz22lg4rZZxYIoEC0P3vVDkH3mPCnnE
qPSMtwtV+o1//cOQHjD7VfjeScO69R7u
=Np5A
-----END PGP SIGNATURE-----
-----------------------------------------------------------------
Mark Heaney finger snipe@starburst.cbl.cees.edu for public key
PGP Fingerprint= BB D8 9B 07 51 87 05 AC 47 7B F2 4F A6 AB 1A CD
-----------------------------------------------------------------
You keep using that word, I dunna think it means what you think it means.
Return to October 1996
Return to “apteryx@super.zippo.com (Mark Heaney)”
1996-10-11 (Fri, 11 Oct 1996 13:53:12 -0700 (PDT)) - Re: Why not PGP? - apteryx@super.zippo.com (Mark Heaney)