-------- Original Message --------
Subject: [FYI] (Fwd) Please make stable NON-US homes for
strong crypto projects (fwd)
Date: Sun, 16 Sep 2001 00:31:56 +0200 (CEST)
From: Hauke Johannknecht
To:
-----BEGIN PGP SIGNED MESSAGE-----
offtopic (or not) like the rest of the current discussion.
i hereby offer mirroring service for projects on servers operated
by different legal entities in different european cities on
different backbones.
projects interested in getting mirrored or people interested in
offering additional mirror capacity, just send me a mail.
please consider using PGP.
Gruss,
Hauke
- --
Hauke Johannknecht Berlin / Germany HJ422-RIPE
Use PGP ! -> lynx -dump http://www.ash.de/ash.asc | pgp -kaf
- ------- Forwarded message follows -------
To: cryptography@wasabisystems.com, gnu@toad.com
Subject: Please make stable NON-US homes for strong
crypto projects
Date sent: Sat, 15 Sep 2001 00:32:12 -0700
From: John Gilmore
It's clear that the US administration is putting out feelers to
again ban publication of strong encryption. See:
http://www.wired.com/news/politics/0,1283,46816,00.html
The evil gnomes who keep advancing unconstitutional US anti-crypto
policies know that the current hysteria in Congress and the
Administration will not last forever. So they will probably
move very
quickly -- within a week is my guess -- to re-control encryption,
either by a unilateral action of the Administration (by
amending the
Export Administration Regulations), or by stuffing a rider
onto some
so-called "emergency" bill in Congress.
They maneuvered very carefully in the Bernstein case such
that there
is no outstanding injunction against violating the
Constitution this
way -- and even no binding 9th-Circuit precedent that tells
them it's
unconstitutional to do so. They know in their hearts that numerous
judges have found it unconstitutional, but they have proven throughout
the seven-year history of the case that they don't give a
damn about
the Constitution. Which means it may take weeks, months or
years for
civil liberties workers to get a judge to roll back any such action.
Not just days. We won the case, but they squirmed out of any
permanent restrictions -- so far.
The US government has a new mania for wiretapping everyone
in case
they might be a terrorist. There's already two bills in
Congress to
make it trivial for them to wiretap anybody on flimsy
excuses, and to
retroactively justify their precipitous act of rolling
Carnivore boxes
into major ISPs this week and demanding, without legal
authority, that
they be put at the heart of the networks. See:
http://www.politechbot.com/docs/cta.091401.html
Even more than before, we will need good encryption tools,
merely to
maintain privacy for law-abiding citizens, political
activists, and
human rights workers. (In the current hysteria, mere messages
advocating peace or Constitutional rights might best be encrypted.)
The European Parliament also recently recommended that European
communications be routinely encrypted to protect them from pervasive
US Echelon wiretaps.
Some US developers, who thought such a reversal would never happen,
have built or maintained a number of good open source
encryption tools
in the United States, and may not have lined up solid foreign
maintainers or home sites.
LET'S FIX THAT! We need volunteers in many countries to mirror
current distributions, CVS trees, etc. We need volunteers
to also act
as maintainers, accepting patches and integrating them into solid
releases.
(Note that too many countries have pledged to stand
toe-to-toe with
the US while they march off to make war on somebody they
can't figure
out who it is yet. If you live in one of those countries,
you may
suddenly find that your own crypto regs have been sneakily altered.
Take care that each useful package has maintainers and distribution
points in diverse countries.)
I haven't kept close track of which packages are in danger. I
suggest that people nominate packages on this mailing list,
and that
others immediately grab mirror copies of them as they are nominated.
And that some of those who mirror them keep quiet, in case hysterical
governments make a concerted effort to stamp out all copies
and/or all
major distribution sites. If you aren't the quiet type,
then *AFTER*
IMMEDIATELY PULLING A COPY OF THE CODE OUTSIDE US JURISDICTION,
announce your mirror on this mailing list.
We freedom-loving US citizens have had to rely on the freedom-loving
citizens of saner countries, to do the work of making strong
encryption, for many years. We had a brief respite, which
we will
eventually resume for good. In the meantime, please let me apologize
for my countrymen and for my government, for asking you to shoulder
most of the burden again. Thank you so much.
John Gilmore
PS: Companies with proprietary encryption packages might consider
immediately open-sourcing and exporting their encryption
add-ins, so
their customers can still get them from overseas archives.
Or taking
other actions to safeguard the privacy and integrity of their
customers' data and their society's infrastructure. I also advise
that they lobby like hell to keep privacy and integrity
legal in the
US.
- ---------------------------------------------------------------------
The Cryptography Mailing List Unsubscribe by sending "unsubscribe
cryptography" to majordomo@wasabisystems.com
- ------- End of forwarded message -------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iQEVAwUBO6PW33O2fBh4VhzZAQEIbggArfO0y50rK1+thZDu7tG2IZbAIyTPjgf0
9B/Cwkk4eZ3QKa9RinvOMMkGtgcJkJdxL9JS/6pLCS0K9MTwGoUtqgLH3PywEohx
7l09NjSWzLYnWR+61tKFkddNNZB+/N9Y49iTH2XukwpYpvndL0b1JfzAGeYAOjr1
8r6g7jkG4nRcSnbnq1G+H0e93ZVza5V6ftyDUCXIVY8IXf7ja34eEa3uUJPr1Nga
i7Xbf72q7v3oiUxO+epKI6+V+vEJE3wB31B+0os6klNU6RqpNh09tFU3/Ow7EK57
Ei17NbMEF5U2994sIHEMFcM1M3pcbCnWsVFBslg/S3Y59fYfjkHOwA==
=FgzA
-----END PGP SIGNATURE-----
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/