From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 3c3302fc6e01e100205458a166c24a4caec9829a2203e5d40df91ebf73e6bfbd
Message ID: <1.5.4.32.19961107011948.006de8fc@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-11-07 01:21:14 UTC
Raw Date: Wed, 6 Nov 1996 17:21:14 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Wed, 6 Nov 1996 17:21:14 -0800 (PST)
To: cypherpunks@toad.com
Subject: ANO_mal
Message-ID: <1.5.4.32.19961107011948.006de8fc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
11-6-96. FiTi:
"Anomalies across international borders"
"I think there is a feeling that the UK's long history
of success in code-cracking makes the security services
confident about being able to break through any encryption
scheme -- or use criminal law to enforce surrender of the
key," Neil Barrett says. In his recent book, "The
State of the Cybernation", he examines cross-border
encryption issues in greater detail.
-----
http://jya.com/anomal.txt
ANO_mal
Return to November 1996
Return to “John Young <jya@pipeline.com>”
1996-11-07 (Wed, 6 Nov 1996 17:21:14 -0800 (PST)) - ANO_mal - John Young <jya@pipeline.com>