From: “Peter D. Junger” <junger@upaya.multiverse.com>
To: Cypherpunks <cypherpunks@cyberpass.net>
Message Hash: 59d08f8805fbd52e1a66680f2c523f07dda84f70c161e1a2471e86db041b44af
Message ID: <199709121203.IAA11005@upaya.multiverse.com>
Reply To: <199709101229.NAA02196@server.test.net>
UTC Datetime: 1997-09-12 12:13:24 UTC
Raw Date: Fri, 12 Sep 1997 20:13:24 +0800
From: "Peter D. Junger" <junger@upaya.multiverse.com>
Date: Fri, 12 Sep 1997 20:13:24 +0800
To: Cypherpunks <cypherpunks@cyberpass.net>
Subject: Re: House National Security committee guts SAFE, worse than no bill
In-Reply-To: <199709101229.NAA02196@server.test.net>
Message-ID: <199709121203.IAA11005@upaya.multiverse.com>
MIME-Version: 1.0
Content-Type: text/plain
Adam Back writes:
:
: Declan McCullagh <declan@well.com> writes:
: >
: > I was talking to someone after a law class this evening (we're covering
: > electronic privacy topics, but unfortunately we're not at crypto yet). He
: > suggested widespread civil disobedience.
:
: Might I suggest using RSA in perl:
:
: print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
: )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
:
: which is now officially non-exportable (as reported by Peter Junger;
: he asked for serveral code examples and this one was one of the
: non-exportable ones). Short enough to make them look silly, short
: enough that most people don't have qualms about quoting, or using as a
: .sig. And they've committed themselves in writing to Peter Junger
: that you're not allowed to export it.
For the classification by the commerce department of the programs that
my Legal Attack Team submitted, and for the applications, see
<http://samsara.law.cwru.edu/comp_law/jvd/index.html>.
It is unlikely that we will be seeking further classifications in
connection with my suit, but it might be an interesting and useful
project---not involving civil disobedience---for some of you. It
would be interesting to see exactly which encryption programs the
bureaucrats classify as encryption programs, and which they don't.
It would also be interesting to see if they give the same
classifications in response to requests by those who are not suing
them.
I must, however, warn you that it is not an easy project. It cannot
be done by e-mail and you have to get numbered forms from Commerce
Department on which the applications must be submitted. In fact,
the difficulty of applying for a classification or a license is one of
the many reasons for concluding that the export restrictions on
cryptography violate the United States Constitution.
It would certainly be helpful if it turned out that that Commerce
cannot or will not respond promptly to classification requests made by
would-be publishers of cryptographic software who are neither
commercial publishers nor suing to enjoin the enforcement of the
regulations.
--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
EMAIL: junger@samsara.law.cwru.edu URL: http://samsara.law.cwru.edu
NOTE: junger@pdj2-ra.f-remote.cwru.edu no longer exists
Return to September 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”