
I think we are in violent agreement here ... Except that it seems odd that speech is no longer 1st amendment protected as soon as it can be interpreted by a machine to do something. So, then, if I want to deny you first amendment protections for something, I can simply write a compiler to turn your words into machine executable code, and suddenly, your words are no longer protected speech. How could that be a reasonable interpretation of functional versus not? Secondly, Gwin said that encryption is a special class of software which is MORE functional. This is definitely a misunderstanding, to say the least. I don't see how any particular class of software is necessarily more or less functional than other classes of software. In the functional sense, all software, when compiled and executed is functional, period (whether it performs according to its original design is irrelevant). Ern -----Original Message----- From: Ed Gerck [SMTP:egerck@laser.cps.softex.br] Sent: Monday, July 06, 1998 9:09 PM To: Ernest Hua Cc: cypherpunks@toad.com; 'cryptography@c2.net' Subject: RE: Junger et al. On Mon, 6 Jul 1998, Ernest Hua wrote: >So today, I can write the following: > >1. Find a container. >2. Fill container with explosive substance. >3. Move container to target location. >4. Detonate container. > >As soon as I have a compiler and a target machine that can execute these >instructions, suddenly this is not speech. However, before this >compiler and machine combo exists, event the electronic form of this is >speech! > >How could this be? Gwin has written a phrase which deserves more analysis, IMO -- free from political overtones if we want to be impartial. The phrase can be reworded as: "source code is a device, that actually does a function" The difference and importance here is between syntatic and semantics. Your 4-instruction source code above is not a device today -- it cannot perform any function. It has only syntatics, not the "how to". But, if there were a machine that could supply the proper semantics (ie, actually perform the functions 1-4) then your source code above would be a device. Further, your source code may not be a device today but be a device tomorrow. As another example, bringing together one pound of inert metal with another one pound of the same inert metal was not considered to be explosive -- until U235 was used for the inert metal and properly compressed. The difference is semantic, not syntatic. In that, Gwin is correct. Can the source code actually perform a function? Then, it is a device. Irrespective of the needed platform, in the same way that an electric shaver is a device irrespective of the local availablity of an appropriate power outlet. IMO, even though I consider Gwin to be correct to a very large extent, widespread use of crypto will not come from lifiting such bans ... but from real need -- which does not outweigh the hassle, today. The EFF has a wrong target there. Do you know how much Internet e-mail traffic is encrypted today? Can you believe less than 10%? Notwithstanding the rethoric exercises and limelight it may provide, talking about encryption export bans may not be as effective as desigining better and easier uses of strong crypto -- that can then really drive market, legislation and courts. Need to use is a better key than need to know, it seems. Cheers, Ed Gerck > >Ern > > -----Original Message----- > From: jkthomson [SMTP:jkthomson@bigfoot.com] > Sent: Monday, July 06, 1998 7:12 PM > To: cypherpunks@toad.com > Subject: Junger et al. > > > > Reuters > > 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has >dismissed a law > professor's challenge to US regulations strictly limiting the >export of > computer data-scrambling technology. > > Judge James Gwin ruled late Friday that the export limits, which >prevented > Case Western Reserve University Law School professor Peter >Junger from > posting the text of encryption programs on the Internet, did not >violate > the constitutional right to free speech. > > The Ohio court's ruling contradicts a California district court >ruling last > August that said source code -- the instructions a person writes >telling > the computer what actions to perform -- constitutes a form of >speech > subject to First Amendment protection. > > "Unlike instructions, a manual or a recipe, source code actually >performs > the function it describes," Gwin wrote. "While a recipe provides > instructions to a cook, source code is a device, like embedded >circuitry in > a telephone, that actually does the function of encryption." > > Neither ruling gave speech protection to compiled code, a >version of source > code converted into an actual software program that could be run >on a > computer. > > The US government appealed the California decision and the issue >may > ultimately be decided by the Supreme Court. > > Civil libertarians and high-tech companies had hoped the court >would > overturn the export limits on encryption technology, which uses > mathematical formulas to scramble information and render it >unreadable > without a password or software "key." > > Once the realm of spies and generals, encryption has become an >increasingly > critical means of protecting electronic commerce and global >communications > over the Internet. > > But law enforcement agencies, fearing encryption will be used by >terrorists > and international criminals to hide their activities, have >instituted > strict controls to limit the export of strong scrambling >products. > > Lawyers opposed to the export rules said the Ohio court >misunderstood the > difference between source code and compiled code. > > "The Ohio court clearly doesn't understand the communicative >nature of > software," said Shari Steele, an attorney with the Electronic >Frontier > Foundation. "It's true that software helps to perform functions, >but it > does so by telling computers what to do.... It certainly is >speech > deserving of the highest levels of First Amendment protection." > > > >
-----------------------------------------------------------------------
james 'keith' thomson <jkthomson@bigfoot.com> www.bigfoot.com/~ceildh jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98] ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98] ICQ:746241 <keys> at pgp.mit.edu ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
Technology is introduced, utilized, depended upon, obsolete, standardized, and understood, in that order
======================================================================= _
______________________________________________________________________ Dr.rer.nat. E. Gerck egerck@novaware.cps.softex.br http://novaware.cps.softex.br --- Meta-Certificate Group member, http://www.mcg.org.br ---