[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: rc2 export limits..
keywords: block cipher, Bruce Schneier, SHA, ITAR
Thanks to Perry Metzger and Andrew Loewenstern for their responses to
my question viz: Why is SHA export controlled? I should always check
_Applied Cryptography_ first before I ask a question. And I guess now
that I have two copies, I could leave the red one at the office and
bring the blue one home.
I didn't reply to Andrew Loewenstern and Perry Metzger separately,
because I think they both read the list, and I think replying to both
might be bad form in those cases where the person is known to read the
list.
on the subject of anonymity, maybe some folks have yet to understand
the binary nature of it. If there are exceptions to anonymous writing
that can be enforced against the writer, then it's over. Either others
will be able to compel discovery of anonymous writers' True Names or
they won't.
If methods exist that permit writers to remain anonymous with very high
degrees of assurance that their true identities will not be found out,
then we will have anonymity. It's either one or the other. Anonymity
can be used to produce hate speech, lies, posting of intellectual
property, and other things that many of us would rather not see. But,
that is the price of having anonymity where it is needed and valuable.