From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: 1916c36cb7511a58c2955468dd0515c0c117432b9b45418ec739f34babf84668
Message ID: <Fk58Be27w165w@bwalk.dm.com>
Reply To: <199708261557.JAA17065@infowest.com>
UTC Datetime: 1997-08-30 00:50:04 UTC
Raw Date: Sat, 30 Aug 1997 08:50:04 +0800
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sat, 30 Aug 1997 08:50:04 +0800
To: cypherpunks@toad.com
Subject: Re: H/W v S/W encryption Constitutional challenge --The Next Generati
In-Reply-To: <199708261557.JAA17065@infowest.com>
Message-ID: <Fk58Be27w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain
"Attila T. Hun" <attila@hun.org> writes:
>
> IM[NSH]O, we need a test case that _differentiates_ between
> hardware encryption engines and _software_for_encryption (not to be
> confused with firmware). Patel rendered an important decision, but
> she refrained from establishing national jurisdiction; our only hope
> in this instance is further citations as to relevance.
Hmm. The patents on algorithms are phrased as patents on a hardware device
implementing the algorithm. If the gubmint had a precedent of hardware
exports being banned, could they present a software-only export as a
part of a hardward/software package? Just thinking.
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
Return to August 1997
Return to “John Young <jya@pipeline.com>”