Re: Kryptonite v2.0 Now Available!
- Posted by Alan Tu <ATU5713 at COMPUSERVE.COM> Dec 29, 1998
- 494 views
This shall be the last message on the listserver on this subject. All those who want the file (there is a new version with hidden password entry, file wipe, etc), e-mail me personally. Those inside the US I will give the file. Those outside the US, I will not I will not I will not give you the file anymore, but please, e-mail me still if you want it. But I feel I have to have the chance to respond to some comments that already have been made. >It should be noted that civil disobedience is only acceptable when ALL >other efforts to change the law have been fruitless. In 1955, when Martin Luther King boycotted the buses at Montgomery, couldn't he have filed a suit? I'm sure he could have. >That does not apply here. There are a number of lawsuits in action right >now >to lift some or all export regs. If someone in another land asks for my program, I'm supposed to turn him away? Then I become the instrument of these regulations. > Just because you are impatient is not >justification for breaking the law. I'm not impatient; I already have my program. But some people want this program, now. >Current US law also allows for algorithms with 56-bit or smaller keys to >be >exported. 56-bit keys can be broken by brute-force, as was demonstrated at the Crypto '93 conference. It is no longer considered strong by those authoritative people in the crypto community. 2^56 boggles my mind, but the fact is it isn't considered strong. >If and when the regs are lifted you could release the better code. Why should I have to make the people outside the US wait? I should I choose to be the instrument of, as you put it, bigotry? >>>>> Information is power and is most often used as either a tool or a weapon. In this case it is a defensive weapon designed to defeat the offensive efforts of whomever is seeking knowledge. Imagine Saddam knew all of our troop movements & attack plans during the original Desert Storm... how effective would we have been if he had detailed access to our information? Maybe you should read the story of PURPLE too. <<<<< That's why encryption should be propagated naturally, like a river. >>>>> All forms of security are defensive weapons and defensive weapons are the most effective (AND most non-violent) means to the end. Your car alarm (physical security) is a defensive weapon against theft. Your insurance policy (financial security) is a defensive weapon against debt. Your encryption program (information security) **is** a defensive weapon against invasions of privacy. <<<<< Pardon, but you're damned right. A weapon implies destruction. A Hawke AA missile is destructive. But this is not a weapon; it is a counter-measure since it does not destroy. >Should we be entitled to such privacy? Absolutely yes. Tell me how the people in other countries who don't have the talent to write this can have my program within the next wek legally. >Should we break the law to get it? Not if we can change the law instead, >and >we can. OK, longer timeline. Tell me how I can cause the law to change oh, say, in the next six months? Or even a year? Alan