[5768] in cryptography@c2.net mail archive
Re: The well-travelled packet
daemon@ATHENA.MIT.EDU (Russell Nelson)
Sat Sep 25 18:43:38 1999
From: Russell Nelson <nelson@crynwr.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Sat, 25 Sep 1999 09:29:14 -0400 (EDT)
To: ray@unipay.nl
Cc: cryptography@c2.net, stpeters@NetHeaven.com
In-Reply-To: <UTC199909250733.JAA35038.ray@prauw.cwi.nl>
Message-ID: <14316.52506.241996.611475@desk.crynwr.com>
Ray Hirschfeld writes:
> Seriously, my first reaction was that no crime had been committed, but
> upon re-examining the export regulations I'm not so sure. Perhaps the
> fact that the packets are explicitly destined for the US is considered
> "adequate precaution" against unauthorized transfer. Here is the
> relevant section [734.2(b)(9)] of the EAR:
The precautions may be "usual", but they are certainly not
sufficient. If crackers can write a credit card number scanner, they
can write a crypto code scanner, particularly if they're looking for a
special package.
But really, this is just a curio. Anyone can get a shell account on
some ISP's computer in the US, and download to their heart's content.
The crypto export laws are not based at curtailing export, they're
aimed directly at businesses. It may hurt to be a US crypto
businessman, but at least you can take comfort from the fact that your
pain is intended. :(
--
-russ nelson <nelson@crynwr.com> http://russnelson.com
Crynwr sells support for free software | PGPok | Government schools are so
521 Pleasant Valley Rd. | +1 315 268 1925 voice | bad that any rank amateur
Potsdam, NY 13676-3213 | +1 315 268 9201 FAX | can outdo them. Homeschool!