1998-09-07 - Re: What we are Fighting

Header Data

From: Declan McCullagh <declan@well.com>
To: John Young <jya@pipeline.com>
Message Hash: 771b1b95da877980792e4b07dda30a9edbc772ae34f2e79ea363a7ccb769679e
Message ID: <Pine.GSO.3.95.980907145410.17348F-100000@well.com>
Reply To: <199809071546.LAA21825@camel7.mindspring.com>
UTC Datetime: 1998-09-07 21:57:50 UTC
Raw Date: Tue, 8 Sep 1998 05:57:50 +0800

Raw message

From: Declan McCullagh <declan@well.com>
Date: Tue, 8 Sep 1998 05:57:50 +0800
To: John Young <jya@pipeline.com>
Subject: Re: What we are Fighting
In-Reply-To: <199809071546.LAA21825@camel7.mindspring.com>
Message-ID: <Pine.GSO.3.95.980907145410.17348F-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



If anyone does it with an eye to civil disobedience, let me know. But the
bill isn't law yet, and one might reasonably hope that it won't be.

The details vary. First it was crypto in the commission of a felony. Now
it's been narrowed considerably, though not all bills have the "better"
version.

-Declan

On Mon, 7 Sep 1998, John Young wrote:

> It would be fitting for this list to be distinguished as
> the place where crypto-in-a-crime was first committed.
> 
> What might that be? A match of the crime committed
> to prevent widespread strong crypto?
> 
> Crypto-criminal anonymity in the national interest (governmental
> secrecy) fighting to prevent crypto-criminal anonymity in the 
> public interest (private secrecy).
> 
> This is not a troll, but query on what could be done to to tip the 
> hand and identify those unnamed who are most fearful of strong 
> cryptography, not their public rougers in the 3 divs of gov.
> 
> 
> 
> 
> 
> 





Thread