[6321] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: DeCSS Court Hearing Report

daemon@ATHENA.MIT.EDU (Phil Karn)
Tue Jan 4 14:15:11 2000

Date: Tue, 4 Jan 2000 10:57:01 -0800 (PST)
Message-Id: <200001041857.KAA29179@servo.qualcomm.com>
From: Phil Karn <karn@qualcomm.com>
To: ray@unipay.nl
Cc: bram@gawth.com, shamrock@cypherpunks.to, cypherpunks@algebra.com,
        cryptography@c2.net, gnu@toad.com, karn@qualcomm.com
In-reply-to: <UTC200001040821.JAA32310.ray@prauw.cwi.nl> (message from Ray
	Hirschfeld on Tue, 4 Jan 2000 09:21:04 +0100 (MET))

>No, October 28, 2000 is when the act of circumventing an effective
>technological measure becomes a violation (with exceptions for fair

But if it was an "effective technological measure", it couldn't have
been circumvented. And by circumventing CSS, wasn't it shown to not be
an effective technological measure??

Phil


home help back first fref pref prev next nref lref last post