[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Junger et al.



On Tue, 7 Jul 1998 [email protected] wrote:

> Indeed.. what we need is for someone to testify to the court about
> natural and computer language, and maybe some relevent material from
> information theory. 

	What we need, IMO, is a well-placed stunt or two.

	On sci.crypt a while ago I mentioned that if perl-RSA got
	any smaller, one could make it the *subtitle* of one's next
	book:  "Blah blah blah:  what ``/usr/bin/perl blah blah blah
	...'' means."

	The result would be a book, with book-like 1st amendment
	protections, but which would turn ONLINE library card 
	catalogs into online repositories for strong crypto.  Need RSA?
	Look up the book, cut and paste into a shell.  Ta Daaaa!
	You're an evil terrorist.

	The point of this is to drive home the fact that while
	source code is something that *does* (i.e., a device),
	it's also something that *says*.  It's information, even
	if executable information, and cannot be dispatched as 
	easily as a gun or a bomb.  Should the government attempt
	to declare a book title a munition, it'll fer sure end up
	in CNN fringe.

> Pseudo-code from any computer programming textbook would be helpful
> in making this point too.

	You'd need to prove it easily runnable.  What's the tech
	status of OCR via, say, a minicam?  If you could just 
	hold a page of _Applied Crypto_ up to your computer and
	have it gleen C source (much easier than gleening English),
	It'll demonstrate the fuzziness of these things (again, IMO) 
	in much starker terms than would just using a scanner.

	Another project would be to collect all our number theory
	and abstract algebra books, and type in verbatim the sections
	on RSA.  These usually contain instructions somewhere between
	pseudocode and conversational English.  If someone could 
	for a Masters thesis develop a program capable of reading 
	that stuff...

							-Caj