[9106] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Effective and ineffective technological measures

daemon@ATHENA.MIT.EDU (Jim Choate)
Fri Aug 3 14:24:55 2001

Date: Thu, 2 Aug 2001 18:53:28 -0500 (CDT)
From: Jim Choate <ravage@ssz.com>
To: Paul Onions <Paul_Onions@siliconinfusion.com>
Cc: cryptography@wasabisystems.com
In-Reply-To: <000401c118eb$93e0f7e0$a400a8c0@siliconinfusion.com>
Message-ID: <Pine.LNX.3.96.1010802185202.23972I-100000@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII


On Mon, 30 Jul 2001, Paul Onions wrote:

> Indeed, my reading of the following extract defining 'encryption research'
> in the DMCA seems to indicate that it is easier to prosecute someone for
> exposing a vulnarability in a weak system than for a stronger system.
> 
>   `(1) DEFINITIONS- For purposes of this subsection--
> 
>   `(A) the term `encryption research' means activities necessary to
>   identify and analyze flaws and vulnerabilities of encryption
>   technologies applied to copyrighted works, if these activities are
>   conducted to advance the state of knowledge in the field of encryption
>   technology or to assist in the development of encryption products; and
> 
>   `(B) the term `encryption technology' means the scrambling and
>   descrambling of information using mathematical formulas or algorithms.
> 
> The reasoning being that exposing a vulnerability in a weak system will not
> 'advance the state of knowledge in the field of encryption technology'.

It seems to me there is another loop-hole...

"...encryption technologies applied to copyrighted works." If one can
discuss the subject such that the applications never come up, in other
words you're not drawing somebody a roadmap to crack.


 --
    ____________________________________________________________________

                Nature and Nature's laws lay hid in night:
                God said, "Let Tesla be", and all was light.

                                          B.A. Behrend

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post