[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: NSA, ITAR, NCSA and plug-in hooks.
>are specifically designed for the insertion of cryptographic materials,
>or is it the fact that they could be used to support cryptographic
Everything is decided on a case-by-case basis. I was in a meeting
with some NSA export-control people (Dept Z03) and asked a few questions
on this topic trying to nail down the angle of this slipper slope.
Basically, generic buffer-manipulation is okay. "Keyed compression"
where you explicitly passed something called a key to a DLL routine
would be looked on suspiciously. An abstract set of open/modify/close
routines (where open returned a pointer to opaque state, say a session
key :) would be fine. The technical guy quickly grasped that I was
talking about anonymous remailers, but they "conceded" there's nothing
they can do about it.
I say "concede" because that implies more political/control-issues
then were really present at the meeting.