From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 092cc743b898c86f47f33e9a04c944447f3993ef6a115fa9886be5fe171eaca5
Message ID: <1.5.4.32.19970913235944.00814c1c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-09-14 00:39:23 UTC
Raw Date: Sun, 14 Sep 1997 08:39:23 +0800
From: John Young <jya@pipeline.com>
Date: Sun, 14 Sep 1997 08:39:23 +0800
To: cypherpunks@toad.com
Subject: Re: Nightmare Scenario: Public Key Distribution Controlled
Message-ID: <1.5.4.32.19970913235944.00814c1c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Does the following provision of the amendment lighten
Tim's dim glim?
"§ 2804. Encryption products manufactured and intended
for use in the United States ...
(d) USE OF PRIOR PRODUCTS LAWFUL.-- After
January 31, 2000, it shall not be unlawful to use any
encryption product purchased or in use prior to such
date.
[Bottom page 13]
That gives about 450 days to widespread stego, surrept
onions and backchannels to prepositioned stashes. Max
use prior to.
Or, say to hell with it, coders will forever evade USCoders.
Return to September 1997
Return to “Vin McLellan <vin@shore.net>”