1997-09-12 - RE: House National Security committee guts SAFE, worse than no bill

Header Data

From: Jonathan Wienke <JonWienk@ix.netcom.com>
To: cypherpunks@cyberpass.net
Message Hash: 5c196ae031bf2da5a4faa622281c99809a62d9d88a3c620d350dde47f64a7600
Message ID: <3.0.3.32.19970911233150.006b2e6c@popd.netcruiser>
Reply To: <01BCBE08.43D9E320.wathab@tiac.net>
UTC Datetime: 1997-09-12 06:51:49 UTC
Raw Date: Fri, 12 Sep 1997 14:51:49 +0800

Raw message

From: Jonathan Wienke <JonWienk@ix.netcom.com>
Date: Fri, 12 Sep 1997 14:51:49 +0800
To: cypherpunks@cyberpass.net
Subject: RE: House National Security committee guts SAFE, worse than no bill
In-Reply-To: <01BCBE08.43D9E320.wathab@tiac.net>
Message-ID: <3.0.3.32.19970911233150.006b2e6c@popd.netcruiser>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3984.1071713731.multipart/signed"

--Boundary..3984.1071713731.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

At 04:40 PM 9/10/97 -0400, Hiawatha Bray wrote:
>I hate to tip folks off as to my column for tomorrow, but that's exactly 
>what I'm doing in it.  I have written that if the Feds try to impose 
>key-recovery crypto on me, I'll start using some encryption program that 
>doesn't comply with the law, and I'll send copies of the messages to the 
>Feds, so they can come and arrest me.  If I really thought they would, I 
>wouldn't have written it!  But I'll stand by it.
>
>Anyway, I don't presently encrypt my mail.  No reason to--I ain't no 
>pedophile...;-)
>So if I want to send crypto I must find some partner in crime.  Any 
>volunteers?

Ditto!

Jonathan Wienke

What part of "the right of the people to keep and bear Arms, shall not be
infringed" is too hard to understand? (From 2nd Amendment, U.S. Constitution)

PGP 2.6.2 RSA Key Fingerprint: 7484 2FB7 7588 ACD1  3A8F 778A 7407 2928
DSS/D-H Key Fingerprint: 3312 6597 8258 9A9E D9FA  4878 C245 D245 EAA7 0DCC
Public keys available at pgpkeys.mit.edu. PGP encrypted e-mail preferred.

Get your assault crypto before they ban it!

US/Canadian Windows 95/NT or Mac users:
Get Eudora Light + PGP 5.0 for free at http://www.eudora.com/eudoralight/
Get PGP 5.0 for free at http://bs.mit.edu:8001/pgp-form.html

Non-US PGP 5.0 sources:
http://www.ifi.uio.no/pgp/
http://www.heise.de/ct/pgpCA/download.shtml
ftp://ftp.pca.dfn.de/pub/pgp/V5.0/
ftp://ftp.fu-berlin.de/pub/pc/win95/pgp
ftp://ftp.fu-berlin.de/pub/mac/pgp
http://www.shopmiami.com/utopia.hacktic.nl/pub/replay/pub/pgp/pgp50/win/

RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

--Boundary..3984.1071713731.multipart/signed
Content-Type: application/octet-stream; name="pgp00003.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00003.pgp"
Content-Description: "PGP signature"

LS0tLS1CRUdJTiBQR1AgU0lHTkFUVVJFLS0tLS0KVmVyc2lvbjogUEdQIGZv
ciBQZXJzb25hbCBQcml2YWN5IDUuMApNZXNzYWdlSUQ6IG5oSWFBV09tU2cx
eExoNHVIUllheE9LUDZ3a05oaXVXCgppUUEvQXdVQk5Cam15c0pGMGtYcXB3
M01FUUlqY2dDZmNudFlLU0JwclRnVmJxS203UVI1VEc3RXc0RUFuaVFFCkEr
VityQWdkRVV6WHFLbk92L01YRGJERwo9YUErYwotLS0tLUVORCBQR1AgU0lH
TkFUVVJFLS0tLS0K
--Boundary..3984.1071713731.multipart/signed--




Thread