NSA, ITAR, NCSA and plug-in hooks.

Scott Brickner sjb at universe.digex.net
Tue Nov 14 13:29:36 PST 1995


Simon Spero writes:
>The interesting question is how narrow the interface has to be before it 
>becomes in violation of the ITAR. Is the key question whether the "holes" 
>are specifically designed for the insertion of cryptographic materials, 
>or is it the fact that they could be used to support cryptographic 
>enhancements?

If the ban *is* due to Category XIII (b) (5), the wording would
indicate that the "hole" must be "specifically designed or modified" to
support crypto.  One that was specifically designed to support some
sort of block compression library should be exempt under that
paragraph, even if someone else were to write and distribute a crypto
library with an identical interface.

'Course, IANAL, and the interpreters of the ITAR don't really seem to
care what it *says*, anyway.






More information about the cypherpunks-legacy mailing list