Effective and ineffective technological measures
Jim Choate
ravage at ssz.com
Thu Aug 2 19:53:28 EDT 2001
On Mon, 30 Jul 2001, Paul Onions wrote:
> Indeed, my reading of the following extract defining 'encryption research'
> in the DMCA seems to indicate that it is easier to prosecute someone for
> exposing a vulnarability in a weak system than for a stronger system.
>
> `(1) DEFINITIONS- For purposes of this subsection--
>
> `(A) the term `encryption research' means activities necessary to
> identify and analyze flaws and vulnerabilities of encryption
> technologies applied to copyrighted works, if these activities are
> conducted to advance the state of knowledge in the field of encryption
> technology or to assist in the development of encryption products; and
>
> `(B) the term `encryption technology' means the scrambling and
> descrambling of information using mathematical formulas or algorithms.
>
> The reasoning being that exposing a vulnerability in a weak system will not
> 'advance the state of knowledge in the field of encryption technology'.
It seems to me there is another loop-hole...
"...encryption technologies applied to copyrighted works." If one can
discuss the subject such that the applications never come up, in other
words you're not drawing somebody a roadmap to crack.
--
____________________________________________________________________
Nature and Nature's laws lay hid in night:
God said, "Let Tesla be", and all was light.
B.A. Behrend
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage at ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list