Own a piece of the crypto wars
If Sameer autographed it, it would probably worth much more. :-) Cheers, RAH ---------- <http://www.creativedestruction.com/archives/000933.html>Creative Destruction Creative Destruction Sameer Parekh + ICON Aircraft Launches | Main | "Angie" ; Own a piece of the crypto wars Back in the day, it was illegal to export cryptographic software. The solution for my company, C2Net Software, Inc., was to develop an offshore development team and have them develop the software there. Other companies developed different strategies. Most opted to sell broken products to their overseas customers. One other company cared about the security of their customers. That company was PGP. PGP chose a different strategy however. They published their source code as a book. The book was then exported, the contents of that book were then scanned in, and then a completely legal international version of PGP was born. More details of the story. Some may associate this PGP scanning effort with the track 'round and round'. That association is not without reason. They may also remember a sign that said, "This is the cypherpunks party tent. If you wish to sleep, remove your tent from the area. Have a nice day (+ night)". That sign, btw, lives on. In any case, I was going through all my boxes trying to decide what I should keep, toss, or sell, and I found my very own copy of the infamous PGP 5.0 source code book. NIB! (Well actually there was no box. But still shrinkwrapped. So NIB.) I decided that the bulk was too much for me to handle moving into a tiny little NYC apartment. So ebay it is. Hopefully it will find a nice loving home. PGP 5.0 Source Code Books: <http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=200231858442&ssPageName=A DME:L:LCA:US:1123
Posted by Sameer on June 14, 2008 4:41 PM | Permalink
archeological email about proposal for doing pgp-like public key (from 1981): http://www.garlic.com/~lynn/2006w.html#email810515 the internal network was larger than the arpanet/internet from just about the beginning until sometime summer of '85. corporate guidelines had become that all links/transmission leaving corporate facilities were required to be encrypted. in the '80s this met lots of link encryptors (in the mid-80s, there was claim that internal network had over half of all the link encryptors in the world). a major crypto problem was with just about every link that crossed any national boundary created problems with both national gov. links within national boundaries would usually get away with argument that it was purely internal communication within the same corporate entity. then there was all sorts of resistance encountered attempting to apply that argument to links that cross national boundary (from just about every national entity). For other archeological lore ... old posting with new networking activity from 1983 http://www.garlic.com/2006k.html#8 above posting includes listing of locations (around the world) that had one or more new network links (on the internal network) added sometime during 1983 (large precentage involved connections requiring link encryptors). more recent post http://www.garlic.com/~lynn/2008h.html#87 mentioning coming to the realization (in the 80s) that there were three kinds of crypto.
participants (2)
-
Anne & Lynn Wheeler
-
R.A. Hettinga