[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Anti-Electronic Racketeering Act of 1995



> >1. If the bill becomes law, how can someone who violates it be
> >punished?
> >
> 
> - From the top of my head:
> Subpoena your service provider's computer records. 


That's not a problem. He will find a lot of encrypted
messages and images of nude girls. Both is not illegal. :-)


> Intimidate your roommate
> into testifying against you.  

I don't have a roommate.


> Tapping your phone. 


I use encrypted modem connections and Nautilus.



> Feds are in the business of putting people behind bars.  They are _very_ good
> at it.

That's the question. How long can they put me behind bars?




> I'm betting that the Feds will adopt as a working definition anything that
> requires a key to decrypt the communications.  That means compression
> software, rot13, and most hash functions are ok.

rot13 is not ok, 13 is the key. Someone should register at the department. :-)



> Expert Testimony:  "We experimented with 113,296 keys chosen at random and
> the defendants algorithm took an average of 29,000 years to find each one.
> It is our professional opinion, therefore, that the defendant is jacking us
> around and ought to be keelhauled".

Oh boy, wonderful experts....



Hadmut