Criminalizing crypto criticism + 802.11b access

David Honig honig at sprynet.com
Sat Jul 28 08:57:33 PDT 2001


At 07:08 AM 7/28/01 -0700, Ray Dillinger wrote:
>
>On Fri, 27 Jul 2001, David Honig wrote:
>
>>>You can create an executable, with source code, package it up and 
>>>send it to the copyright owner with a note that says "your protection 
>>>is broken: here's the proof."
>>
>>How about dropping them a note to send an engineer to DefCon? 
>
>Not a problem -- as long as what you're making available to the 
>public at DefCon is not a program that script kiddies can download 
>and use to break stuff.

What's a 'program' in the above sentence?   Is source a program?  Source
without the main() and #includes?  Source with an intentionally missing ';'?
Precise english description of an algorithm?  Math?  What exactly 
are the limits of a 'script kiddie'?

>
>>>You can shout at the top of your lungs that their crypto is broken, 
>>>on all kinds of forums. 
>>
>>Might be libel if not true.
>
>Oh, yeah, feature them suing you for libel, and then watching aghast 
>as you enter "exhibit A" -- the source code -- into the trial and the 
>public record.  If it successfully decrypts their stuff, it proves that 
>what you said is true.  It also goes all over the internet within 
>about twenty minutes.  

So they get Mr. Judge to seal the docs.

>Bear in mind that these people are not dealing from a position of 
>strength, as long as their crypto is actually broken.  

Tell that to Dmitri. :-<





More information about the cypherpunks-legacy mailing list