Re: FBI calls for mandatory key escrow; Denning on export ctrls
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 So, looking at all this, what does it mean???? Are they going to have an amnesty period when I can run down to my local firehouse and turn in my PGP5 CDROM without risking going to jail? Will MIT turn over logs of everyone who ever d/l-ed PGP2 and we have four weeks to turn over every backup disk we ever made? If they do get this by us, and I decide to use their silly-assed encryption, do I get a ten year all expense paid vacation at the Allenwood Hilton if I send my bootlegged PGP message inside their encryption? -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNA4oP8dZgC62U/gIEQLkIQCgsEasNm3JxBrHz1djEo2BvO1jyikAnis8 fDdwE1GjXBOhOMRrNRxSs0XW =Wz3y -----END PGP SIGNATURE----- Brian B. Riley --> http://www.macconnect.com/~brianbr For PGP Keys - Send Email Subject "Get PGP Key" "Patriotism is the last refuge of the scoundrel" -- Samuel Johnson "With all due respect to an enlightened but inferior lexicographer I beg to submit that it is the first." -- Ambrose Bierce's commentary on Johnson's definition.
-----BEGIN PGP SIGNED MESSAGE----- In <199709040317.XAA32663@mx01.together.net>, on 09/03/97 at 11:17 PM, "Brian B. Riley" <brianbr@together.net> said:
So, looking at all this, what does it mean???? Are they going to have an amnesty period when I can run down to my local firehouse and turn in my PGP5 CDROM without risking going to jail? Will MIT turn over logs of everyone who ever d/l-ed PGP2 and we have four weeks to turn over every backup disk we ever made? If they do get this by us, and I decide to use their silly-assed encryption, do I get a ten year all expense paid vacation at the Allenwood Hilton if I send my bootlegged PGP message inside their encryption?
Well Freeh and the rest of his Gestapo are more than welcome to come and pick-up all the crypto software I have solong as the are willing to collect the several cases of lead I have also. :) - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNA4jyI9Co1n+aLhhAQGdogP+Mh3iaJv4hfoi4zPsYc5vcrmYdGaxpoaJ wYo585nBJtCV3QXNrOPNQEhuU2dZtuqyTjJH2ysFdbYxw5cq1tRG8aNXWzBDTiJp GYg7ChK5qB0VK3iT3IhThog1n/fEyEwRf3cdJYcEMv0NgO35jmFH6lkcqhqSknPH b7h3j30JIsI= =XFwC -----END PGP SIGNATURE-----
At 8:17 PM -0700 9/3/97, Brian B. Riley wrote:
So, looking at all this, what does it mean???? Are they going to have an amnesty period when I can run down to my local firehouse and turn in my PGP5 CDROM without risking going to jail? Will MIT turn over logs of everyone who ever d/l-ed PGP2 and we have four weeks to turn over every backup disk we ever made? If they do get this by us, and I decide to use their silly-assed encryption, do I get a ten year all expense paid vacation at the Allenwood Hilton if I send my bootlegged PGP message inside their encryption?
As I understand what Freeh said, not even he is talking about banning existing programs. Rather, he's talking about requiring the "capability" be added to Internet programs (presumably browsers, mail programs, etc.). It's obvious that one could use an old word processor, editor, PGP, etc., and then paste the text into the Freeh-approved Internet program. What would the status be of this? (In other words, it would be a truly draconian move to try to ban all encrypted messages.) But I think we should accelerate the use of steganography. (Oh, and for the bozos who've said I just "talk," while they write code, check the ancient archives of sci.crypt, circa 1989, and see that I reported on using the LSBs of GIF images and DAT tapes to hide bits. I didn't find earlier messages in sci.crypt reporting on this idea, but it's quite possible that I was not the first to think of this. I don't claim a scientific discovery! I reported my experiments over the next couple of years, and Romana Machado credited me in her "Stego" program, circa '93. Of course, by the time Peter Wayner wrote his little book, "Disappearing Writing," or somesuch, all of the "inventors" of this LSB approach to crypto were others, and they did their work several years after my sci.crypt posts. I guess I didn't shout out enough. Or Peter didn't do much research.) --Tim There's something wrong when I'm a felon under an increasing number of laws. Only one response to the key grabbers is warranted: "Death to Tyrants!" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1398269 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway."
Freeh did not mention banning existing programs. He did, however, talk about restricting what was distributed, sold, and imported. Even so, it only takes one intrepid staffer to add a word to the bill that would include an "or possessed" clause in it. A "per se" rule against crypto! -Declan On Wed, 3 Sep 1997, Tim May wrote:
As I understand what Freeh said, not even he is talking about banning existing programs. Rather, he's talking about requiring the "capability" be added to Internet programs (presumably browsers, mail programs, etc.). It's obvious that one could use an old word processor, editor, PGP, etc., and then paste the text into the Freeh-approved Internet program. What would the status be of this?
(In other words, it would be a truly draconian move to try to ban all encrypted messages.)
participants (4)
-
Brian B. Riley -
Declan McCullagh -
Tim May -
William H. Geiger III