[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Junger et al.



On Mon, 6 Jul 1998, Ernest Hua wrote:

>So today, I can write the following:
>
>1.	Find a container.
>2.	Fill container with explosive substance.
>3.	Move container to target location.
>4.	Detonate container.
>
>As soon as I have a compiler and a target machine that can execute these
>instructions, suddenly this is not speech.  However, before this
>compiler and machine combo exists, event the electronic form of this is
>speech!
>
>How could this be?

Gwin has written a phrase which deserves more analysis, IMO -- free
from political overtones if we want to be impartial. The phrase can
be reworded as:

  "source code is a device, that actually does a function"

The difference and importance here is between syntatic and semantics. 

Your 4-instruction source code above is not a device today -- it
cannot perform any function. It has only syntatics, not the "how to". 
But, if there were a machine that could supply the proper semantics
(ie, actually perform the functions 1-4) then your source code above
would be a device.  Further, your source code may not be a device
today but be a device tomorrow.

As another example, bringing together one pound of inert metal with
another one pound of the same inert metal was not considered to be
explosive -- until U235 was used for the inert metal and properly
compressed. The difference is semantic, not syntatic. 

In that, Gwin is correct. Can the source code actually perform a
function?  Then, it is a device. Irrespective of the needed platform,
in the same way that an electric shaver is a device irrespective of
the local availablity of an appropriate power outlet.

IMO, even though I consider Gwin to be correct to a very large
extent, widespread use of crypto will not come from lifiting such
bans ... but from real need -- which does not outweigh the hassle,
today. The EFF has a wrong target there. 

Do you know how much Internet e-mail traffic is encrypted today?  Can
you believe less than 10%? Notwithstanding the rethoric exercises and
limelight it may provide, talking about encryption export bans may
not be as effective as desigining better and easier uses of strong
crypto -- that can then really drive market, legislation and courts. 

Need to use is a better key than need to know, it seems.

Cheers,

Ed Gerck

>
>Ern
>
>	-----Original Message-----
>	From:	jkthomson [SMTP:[email protected]]
>	Sent:	Monday, July 06, 1998 7:12 PM
>	To:	[email protected]
>	Subject:	Junger et al.
>
>
>
>	Reuters
>
>	3:40pm  6.Jul.98.PDT WASHINGTON -- A district court has
>dismissed a law
>	professor's challenge to US regulations strictly limiting the
>export of
>	computer data-scrambling technology.
>
>	Judge James Gwin ruled late Friday that the export limits, which
>prevented
>	Case Western Reserve University Law School professor Peter
>Junger from
>	posting the text of encryption programs on the Internet, did not
>violate
>	the constitutional right to free speech.
>
>	The Ohio court's ruling contradicts a California district court
>ruling last
>	August that said source code -- the instructions a person writes
>telling
>	the computer what actions to perform -- constitutes a form of
>speech
>	subject to First Amendment protection.
>
>	"Unlike instructions, a manual or a recipe, source code actually
>performs
>	the function it describes," Gwin wrote. "While a recipe provides
>	instructions to a cook, source code is a device, like embedded
>circuitry in
>	a telephone, that actually does the function of encryption."
>
>	Neither ruling gave speech protection to compiled code, a
>version of source
>	code converted into an actual software program that could be run
>on a
>	computer.
>
>	The US government appealed the California decision and the issue
>may
>	ultimately be decided by the Supreme Court.
>
>	Civil libertarians and high-tech companies had hoped the court
>would
>	overturn the export limits on encryption technology, which uses
>	mathematical formulas to scramble information and render it
>unreadable
>	without a password or software "key."
>
>	Once the realm of spies and generals, encryption has become an
>increasingly
>	critical means of protecting electronic commerce and global
>communications
>	over the Internet.
>
>	But law enforcement agencies, fearing encryption will be used by
>terrorists
>	and international criminals to hide their activities, have
>instituted
>	strict controls to limit the export of strong scrambling
>products.
>
>	Lawyers opposed to the export rules said the Ohio court
>misunderstood the
>	difference between source code and compiled code.
>
>	"The Ohio court clearly doesn't understand the communicative
>nature of
>	software," said Shari Steele, an attorney with the Electronic
>Frontier
>	Foundation. "It's true that software helps to perform functions,
>but it
>	does so by telling computers what to do.... It certainly is
>speech
>	deserving of the highest levels of First Amendment protection."
>
>
>
>
>-----------------------------------------------------------------------
>	 james 'keith' thomson <[email protected]>
>www.bigfoot.com/~ceildh
>	 jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
>[06.07.98]
>	 ceildh   :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9
>[05.14.98]
>	 ICQ:746241 <keys> at pgp.mit.edu     ...and former sysop of
>tnbnog BBS
>
>-----------------------------------------------------------------------
>	Technology is introduced, utilized, depended upon, obsolete, 
>	standardized, and understood, in that order
>
>=======================================================================_
>

______________________________________________________________________
Dr.rer.nat. E. Gerck                     [email protected]
http://novaware.cps.softex.br
    --- Meta-Certificate Group member, http://www.mcg.org.br ---