[2921] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Initial summary/analysis: Junger v. Daley

daemon@ATHENA.MIT.EDU (John Young)
Wed Jul 8 11:32:26 1998

Date: Wed, 08 Jul 1998 08:35:58 -0400
To: cryptography@c2.net
From: John Young <jya@pipeline.com>
In-Reply-To: <Pine.BSF.3.96.980707223313.20768A-100000@ideath.parrhesia.
 com>

Thanks to Greg for the excellent summary and analysis.
Responses by Peter Junger and his attorneys, those
involved with Bernstein and Karn, and others on the
technical and legal interpretation would be welcome.

On the interplay among the three cases: We have heard 
that there was meeting in DC of the three teams with the 
US side. And that there may have been a report on this 
meeting at the recent DC security conference. Is there a 
public report available?

Note: Greg meant to quote Judge Gwin on source code: 
"all but *un*intelligible to most people."

The contrast between Patel and Gwin remind of the
campaign of Wassenaar members to claim relaxation
of crypto controls while not truly doing so, as in the
recent Irish and US press release deceptions. More
are expected as the US trade and crypto czars make
their global rounds to arrange overt-covert deals for
marketing munitions. The complicity of the banks 
and giant corps is not surprising with their legacy of 
doing just that -- as one defense expert says, expect 
ex-gov crypto watchdogs to aid the market titans to lure 
government buyers while peddling cheap knockoffs
to voters.

Amazing that the NYT sent up that trial balloon for
government access to key strokes in lieu of GAK.
Dave Emery wrote a good critique of the invasive
concept:

   http://jya.com/gaks-de.htm

Who's pushing that, working on the technology?


home help back first fref pref prev next nref lref last post