[4658] in cryptography@c2.net mail archive
Re: How to donate a clue to a lawyer?
daemon@ATHENA.MIT.EDU (Carl Ellison)
Sun May 9 17:51:50 1999
Date: Sun, 09 May 1999 06:59:13 -0700
To: Cryptography List <cryptography@c2.net>
From: Carl Ellison <cme@acm.org>
Cc: Carl Ellison <cme@acm.org>
In-Reply-To: <kj4slmg2d0.fsf@romeo.rtfm.com>
>From my declaration for the Bernstein case:
http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/Legal/960726_filing/ellison.decl
" 18. Attached hereto as Exhibit C is an excerpt from the August
1967 CACM, giving another example of an article which consists solely of
source code.
19. In addition, the Exhibit C includes the August, 1967,
statement of the algorithm policy of the Association for Computer
Machinery. The policy notes:
It is necessary, but not sufficient for the published algorithm
to operate on some machine and give correct answers. It must also
communicate a method to the reader in a clear and unambiguous
manner. All contributions will be refereed by human beings and
by an appropriate compiler.
"
That is, of course, not the only example.
+------------------------------------------------------------------+
|Carl M. Ellison cme@acm.org http://www.pobox.com/~cme |
| PGP: 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+