Re: Kryptonite v2.0 Now Available!

new topic     » goto parent     » topic index » view thread      » older message » newer message

This shall be the last message on the listserver on this subject.  All
those who want the file (there is a new version with hidden password entry,
file wipe, etc), e-mail me personally.  Those inside the US I will give the
file.  Those outside the US, I will not I will not I will not give you the
file anymore, but please, e-mail me still if you want it.  But I feel I
have to have the chance to respond to some comments that already have been
made.

>It should be noted that civil disobedience is only acceptable when ALL
>other efforts to change the law have been fruitless.

In 1955, when Martin Luther King boycotted the buses at Montgomery,
couldn't he have filed a suit?  I'm sure he could have.

>That does not apply here. There are a number of lawsuits in action right
>now
>to lift some or all export regs.

If someone in another land asks for my program, I'm supposed to turn him
away?  Then I become the instrument of these regulations.

> Just because you are impatient is not
>justification for breaking the law.

I'm not impatient; I already have my program.  But some people want this
program, now.

>Current US law also allows for algorithms with 56-bit or smaller keys to
>be
>exported.

56-bit keys can be broken by brute-force, as was demonstrated at the Crypto
'93 conference.  It is no longer considered strong by those authoritative
people in the crypto community.  2^56 boggles my mind, but the fact is it
isn't considered strong.

>If and when the regs are lifted you could release the better code.

Why should I have to make the people outside the US wait?  I should I
choose to be the instrument of, as you put it, bigotry?

>>>>>
Information is power and is most often used as either a tool or a weapon.
In
this case it is a defensive weapon designed to defeat the offensive efforts
of whomever is seeking knowledge. Imagine Saddam knew all of our troop
movements & attack plans during the original Desert Storm... how effective
would we have been if he had detailed access to our information? Maybe you
should read the story of PURPLE too.
<<<<<

That's why encryption should be propagated naturally, like a river.

>>>>>
All forms of security are defensive weapons and defensive weapons are the
most effective (AND most non-violent) means to the end. Your car alarm
(physical security) is a defensive weapon against theft. Your insurance
policy (financial security) is a defensive weapon against debt. Your
encryption program (information security) **is** a defensive weapon against
invasions of privacy.
<<<<<

Pardon, but you're damned right.  A weapon implies destruction.  A Hawke AA
missile is destructive.  But this is not a weapon; it is a counter-measure
since it does not destroy.

>Should we be entitled to such privacy? Absolutely yes.

Tell me how the people in other countries who don't have the talent to
write this can have my program within the next wek legally.

>Should we break the law to get it? Not if we can change the law instead,
>and
>we can.

OK, longer timeline.  Tell me how I can cause the law to change oh, say, in
the next six months?  Or even a year?

Alan

new topic     » goto parent     » topic index » view thread      » older message » newer message

Search



Quick Links

User menu

Not signed in.

Misc Menu