From: Adam Back <aba@dcs.ex.ac.uk>
To: jya@pipeline.com
Message Hash: 71c394cb6afb2c8a5f5e1be564ed05231d22fa33e34497c96da644d5a707e8c6
Message ID: <199801171025.KAA00273@server.eternity.org>
Reply To: <1.5.4.32.19980117020259.00733f54@pop.pipeline.com>
UTC Datetime: 1998-01-17 18:47:26 UTC
Raw Date: Sun, 18 Jan 1998 02:47:26 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Sun, 18 Jan 1998 02:47:26 +0800
To: jya@pipeline.com
Subject: Re: New Software Controls
In-Reply-To: <1.5.4.32.19980117020259.00733f54@pop.pipeline.com>
Message-ID: <199801171025.KAA00273@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain
[ObNote: the cypherpunks list is not at toad.com]
John Young <jya@pipeline.com> information terrorist writes:
> TH points out that there's a broad new provision in the
> BXA Wassenaar rule for controlling telecommunications
> software under Category 5, Part I - Telecommunications,
> quote:
>
> You might want to highlight the following section ... not sure of the
> entire context ... but this isn't something that I'd seen before. It looks
> like control of any software that can transmit data.
>
> c.3. ``Software'' which provides the capability of recovering
> ``source code'' of telecommunications ``software'' controlled by
> 5A001, 5B001, or 5C001;
Export ban on decompilers? Disassemblers? Debuggers?
These tools are general purpose, so this seems particularly weird.
Adam
Return to January 1998
Return to “John Young <jya@pipeline.com>”