[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Junger et al.
On Mon, 6 Jul 1998, Ernest Hua wrote:
>So today, I can write the following:
>
>1. Find a container.
>2. Fill container with explosive substance.
>3. Move container to target location.
>4. Detonate container.
>
>As soon as I have a compiler and a target machine that can execute these
>instructions, suddenly this is not speech. However, before this
>compiler and machine combo exists, event the electronic form of this is
>speech!
>
>How could this be?
Gwin has written a phrase which deserves more analysis, IMO -- free
from political overtones if we want to be impartial. The phrase can
be reworded as:
"source code is a device, that actually does a function"
The difference and importance here is between syntatic and semantics.
Your 4-instruction source code above is not a device today -- it
cannot perform any function. It has only syntatics, not the "how to".
But, if there were a machine that could supply the proper semantics
(ie, actually perform the functions 1-4) then your source code above
would be a device. Further, your source code may not be a device
today but be a device tomorrow.
As another example, bringing together one pound of inert metal with
another one pound of the same inert metal was not considered to be
explosive -- until U235 was used for the inert metal and properly
compressed. The difference is semantic, not syntatic.
In that, Gwin is correct. Can the source code actually perform a
function? Then, it is a device. Irrespective of the needed platform,
in the same way that an electric shaver is a device irrespective of
the local availablity of an appropriate power outlet.
IMO, even though I consider Gwin to be correct to a very large
extent, widespread use of crypto will not come from lifiting such
bans ... but from real need -- which does not outweigh the hassle,
today. The EFF has a wrong target there.
Do you know how much Internet e-mail traffic is encrypted today? Can
you believe less than 10%? Notwithstanding the rethoric exercises and
limelight it may provide, talking about encryption export bans may
not be as effective as desigining better and easier uses of strong
crypto -- that can then really drive market, legislation and courts.
Need to use is a better key than need to know, it seems.
Cheers,
Ed Gerck
>
>Ern
>
> -----Original Message-----
> From: jkthomson [SMTP:[email protected]]
> Sent: Monday, July 06, 1998 7:12 PM
> To: [email protected]
> Subject: Junger et al.
>
>
>
> Reuters
>
> 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has
>dismissed a law
> professor's challenge to US regulations strictly limiting the
>export of
> computer data-scrambling technology.
>
> Judge James Gwin ruled late Friday that the export limits, which
>prevented
> Case Western Reserve University Law School professor Peter
>Junger from
> posting the text of encryption programs on the Internet, did not
>violate
> the constitutional right to free speech.
>
> The Ohio court's ruling contradicts a California district court
>ruling last
> August that said source code -- the instructions a person writes
>telling
> the computer what actions to perform -- constitutes a form of
>speech
> subject to First Amendment protection.
>
> "Unlike instructions, a manual or a recipe, source code actually
>performs
> the function it describes," Gwin wrote. "While a recipe provides
> instructions to a cook, source code is a device, like embedded
>circuitry in
> a telephone, that actually does the function of encryption."
>
> Neither ruling gave speech protection to compiled code, a
>version of source
> code converted into an actual software program that could be run
>on a
> computer.
>
> The US government appealed the California decision and the issue
>may
> ultimately be decided by the Supreme Court.
>
> Civil libertarians and high-tech companies had hoped the court
>would
> overturn the export limits on encryption technology, which uses
> mathematical formulas to scramble information and render it
>unreadable
> without a password or software "key."
>
> Once the realm of spies and generals, encryption has become an
>increasingly
> critical means of protecting electronic commerce and global
>communications
> over the Internet.
>
> But law enforcement agencies, fearing encryption will be used by
>terrorists
> and international criminals to hide their activities, have
>instituted
> strict controls to limit the export of strong scrambling
>products.
>
> Lawyers opposed to the export rules said the Ohio court
>misunderstood the
> difference between source code and compiled code.
>
> "The Ohio court clearly doesn't understand the communicative
>nature of
> software," said Shari Steele, an attorney with the Electronic
>Frontier
> Foundation. "It's true that software helps to perform functions,
>but it
> does so by telling computers what to do.... It certainly is
>speech
> deserving of the highest levels of First Amendment protection."
>
>
>
>
>-----------------------------------------------------------------------
> james 'keith' thomson <[email protected]>
>www.bigfoot.com/~ceildh
> jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
>[06.07.98]
> ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9
>[05.14.98]
> ICQ:746241 <keys> at pgp.mit.edu ...and former sysop of
>tnbnog BBS
>
>-----------------------------------------------------------------------
> Technology is introduced, utilized, depended upon, obsolete,
> standardized, and understood, in that order
>
>=======================================================================_
>
______________________________________________________________________
Dr.rer.nat. E. Gerck [email protected]
http://novaware.cps.softex.br
--- Meta-Certificate Group member, http://www.mcg.org.br ---