From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: ab7ee0d4b3b8563be0cf23b8116f8986ab507adcebecda65c24a42562f19526e
Message ID: <NwLDBe17w165w@bwalk.dm.com>
Reply To: <Pine.LNX.3.93.970813182619.706A-100000@shirley>
UTC Datetime: 1997-08-13 14:08:40 UTC
Raw Date: Wed, 13 Aug 1997 22:08:40 +0800
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 13 Aug 1997 22:08:40 +0800
To: cypherpunks@toad.com
Subject: Re: Fuck the usenet cabal
In-Reply-To: <Pine.LNX.3.93.970813182619.706A-100000@shirley>
Message-ID: <NwLDBe17w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain
? the Platypus {aka David Formosa} <dformosa@st.nepean.uws.edu.au> writes:
> > Now, suppose some non-US person sets up an auto-responder that sends out
> > strong crypto software, and another non-US person requests it and gets it.
> >
> > Is anyone going to be guilty of ITAR violations?
>
> Well if thay can't trace it back to the person who put it on the system
> thay will go after the system itself.
Another related thought: some folks send out lots of unwanted e-mail
offering to broadcast an ad to a million addresses for $40 or some such.
What if a non-US person paid them $40 to spam people outside the U.S.
with strong crypto?
Is it possible to stuff a blatant ITAR violation into about 100 lines of ascii?
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
Return to August 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”