680 lines
30 KiB
Plaintext
680 lines
30 KiB
Plaintext
########## | Volume I Number 6 |
|
|
########## | |
|
|
### | EFFECTOR ONLINE |
|
|
####### | |
|
|
####### | In this issue: |
|
|
### | NetNews: The EFF Wants You! |
|
|
########## | Computers and Academic Freedom |
|
|
########## | All I Really Need to Know I Learned from my Computer|
|
|
| The Prodigy Saga Marches On...and On |
|
|
########## | S.266: What You Can Do |
|
|
########## | -==--==--==-<:>-==--==--==- |
|
|
### | Editors: |
|
|
####### | Gerard Van der Leun (van@eff.org) |
|
|
####### | Mike Godwin (mnemonic@eff.org) |
|
|
### | Mitchell Kapor (mkapor@eff.org) |
|
|
### | Managing Editors: |
|
|
### |Chris Davis (ckd@eff.org), Helen Rose (hrose@eff.org)|
|
|
| |
|
|
########## | Reproduction of Effector Online via all |
|
|
########## | electronic media is encouraged.. |
|
|
### | To reproduce signed articles individually |
|
|
####### | please contact the authors for their express |
|
|
####### | permission.. |
|
|
### | |
|
|
### | Published Fortnightly by |
|
|
### | The Electronic Frontier Foundation (eff.org) |
|
|
|
|
effector n, Computer Sci. A device for producing a desired change.
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
FAST BREAKS:
|
|
Net News from the Electronic Frontier
|
|
|
|
THE EFF WANTS YOU
|
|
After many months, the EFF has received its 501(c)3 Federal tax
|
|
exemption. This means that membership in, and donations to,
|
|
the EFF are fully tax-deductible.
|
|
For over a year, we have been funding the work of this
|
|
organization through the generosity of a few individuals who
|
|
believe in our mission and our goals. Now we are able to open
|
|
the EFF to people from all our various constituencies throughout
|
|
the world.
|
|
As a result, we would like to ask all of you who support us
|
|
to become members.
|
|
To sustain our current goals and programs, and expand our
|
|
efforts will take the commitment of time and money on the part
|
|
of many people and institutions from all areas of our society.
|
|
We will be raising funds in the near future from a variety
|
|
of sources, but without the concrete support of individuals
|
|
like you, we cannot pursue and achieve our goals of assuring that
|
|
Constitutional protections are extended to online media. Without your
|
|
support we can't effectively advocate policy changes on the federal
|
|
and state level. Without you, we can't continue to effectively pursue
|
|
the education of the general public as to the benefits of online media
|
|
and the potential of the National Public Network of the future.
|
|
Nor can we continue to effectively defend the rights of those wrongly
|
|
accused.
|
|
Pioneer membership rates are $20.00 per year for students
|
|
and low-income supporters, $40.00 per year for regular members.
|
|
We are currently working on an institutional membership program.
|
|
The way this works is simple. We are going to be assembling all
|
|
the detritus of joining an organization: tidy forms, lots of
|
|
check-boxes, payment via Visa or Mastercard, and all the fancy stuff
|
|
you've learned to expect from well-meaning organizations over the
|
|
years. But you can cut to the chase right now and just mail a check.
|
|
And, yes, we are going to be handing out numbers. This means low
|
|
numbers will have a certain cachet with those who value such
|
|
things. And if you don't care, you'll still have the knowledge
|
|
that you've helped us move forward this year and in the future.
|
|
Member Privacy Policy: The EFF will never sell any names or
|
|
information about its members. We will, from time to time, share
|
|
consenting members names with other non-profit organizations which
|
|
we are certain will advance the shared causes and goals of the EFF.
|
|
But, even then, we will only share your name if you consent to it.
|
|
This means you have to state that you grant us the privilege of
|
|
sharing your name. You can revoke this at any time. If you do not
|
|
actively grant us this permission, we will assume that you wish
|
|
your membership to be absolutely confidential.
|
|
You can send your membership fees and/or your additional
|
|
donation to The Electronic Frontier Foundation, 155 Second Street,
|
|
Cambridge, MA 02141. Please include your name, postal address, and
|
|
electronic mail address.
|
|
|
|
THE EFF AND SENATE BILL 266
|
|
At the EFF we continue to oppose the spirit and the letter of
|
|
those provisions of Senate Bill 266 that would require mandatory
|
|
cooperation of telecommunications providers with law enforcement.
|
|
We believe that those individuals and organizations that support
|
|
this initiative fail to understand the implications of compromising
|
|
encryption methods in this time of emergent online technologies.
|
|
In order to play an active role in shaping this legislation
|
|
the EFF expects to meet with the bill's sponsors in Washington
|
|
and express our fundamental opposition to any move on the part
|
|
of the Federal government that would prohibit or have a chilling
|
|
effect on the individual's right to use cryptography.
|
|
|
|
THE CPSR ANNOUNCES A WASHINGTON WORKSHOP
|
|
ON PRIVACY, ENCRYPTION, AND TELECOMMUNICATIONS POLICY
|
|
Computer Professionals for Social Responsibility, the
|
|
Electronic Frontier Foundation, RSA are sponsoring a one-day
|
|
workshop in Washington, D.C. on June 10.
|
|
This workshop will bring together a broad coalition of
|
|
professionals in the computer and telecommunications fields,
|
|
as well as experts in cutting-edge cryptography, privacy
|
|
advocates, and civil liberties protectors. It will feature
|
|
a congressional briefing on current federal policy initiatives
|
|
including S.266 and export restrictions.
|
|
The workshop will be followed at 2:00 by a press conference
|
|
and the National Press Club (14th & Pennsylvania Avenue N.W.). All
|
|
interested parties are invited to attend the press conference.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
EFF DOCUMENT FILES NOW AVAILABLE
|
|
THE DOCUMENT CASE -- a collection of briefs, judgements
|
|
white papers, rulings, and references of moment to the issues
|
|
of law and order on The Electronic Frontier--is now available via
|
|
FTP at eff.org. This represents our current and expanding collection
|
|
of legal papers of interest to attorneys and the net at large. It
|
|
was created and maintained by Staff Counsel Mike Godwin
|
|
(mnemonic@eff.org). For details on how to access this archive
|
|
please contact ftphelp@eff.org.
|
|
To add to the archive, send mail to Michael Godwin (mnemonic@eff.org).
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
COMPUTERS AND ACADEMIC FREEDOM GROUPS NOW AT EFF.ORG
|
|
CAF discusses such questions as : How should general principles
|
|
of academic freedom (such as freedom of expression, freedom to read,
|
|
due process, and privacy) be applied to university computers and
|
|
networks? How are these principles actually being applied? How can the
|
|
principles of academic freedom as applied to computers and networks be
|
|
defended?
|
|
The EFF has given the discussion a home on the eff.org machine.
|
|
As of April 23, less than two week after its creation, the list has
|
|
230 members in four countries.
|
|
There are three versions of the mailing list:
|
|
comp-academic-freedom-talk
|
|
- you'll received dozens of e-mail notes every day.
|
|
comp-academic-freedom-batch
|
|
- about once a day, you'll receive a compilation of the day's notes.
|
|
comp-academic-freedom-news
|
|
- about once a week you'll receive a compilation of the best
|
|
notes of the week. (I play the editor for this one).
|
|
To join a version of the list, send mail to listserv@eff.org.
|
|
Include the line "add <name-of-version>". (Other commands are "delete
|
|
<name-of-version>" and "help").
|
|
In any case, after you join the list you can send e-mail to the
|
|
LIST BY addressing it to caf-talk@eff.org.
|
|
These mailing lists are also available as the USENET alt groups
|
|
'alt.comp.acad-freedom.talk' and 'alt.comp.acad-freedom.news'.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
the sand remembers
|
|
once there was beach and sunshine
|
|
but chip is warm too
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
The Need for a Discussion of Computers and Academic Freedom
|
|
by Carl Kadie (kadie@eff.org)
|
|
|
|
When my grandmother attended the University of Illinois fifty-five
|
|
years ago, academic freedom meant the right to speak up in class, to
|
|
created student organizations, to listen to controversial speakers, to
|
|
read "dangerous" books in the library, and to be protected from random
|
|
searches of your dorm room.
|
|
Today these rights are guaranteed by most universities. These days,
|
|
however, my academic life very different from my grandmother's. Her
|
|
academic life was centered on the classroom and the student union.
|
|
Mine centers on the computer and the computer network. In the new
|
|
academia, my academic freedom is much less secure.
|
|
The suppression of academic freedom on computers is common. At least
|
|
once a month, someone posts on plea on Usenet for help. The most
|
|
common complaint is that a newsgroup has been banned because of its
|
|
content (usually alt.sex). In January, a sysadmin at the University of
|
|
Wisconsin didn't ban any newsgroups directly. Instead, he reduced the
|
|
newsgroup expiration time so that reading groups such as alt.sex is
|
|
almost impossible. Last month, a sysadmin at Case Western killed
|
|
a note that a student had posted to a local newsgroup. The sysadmin
|
|
said the information in the note could be misused. In other cases,
|
|
university employees may be reading e-mail or looking through user
|
|
files. This may happen with or without some prior notice that e-mail
|
|
and files are fair game.
|
|
In many of these cases the legality of the suppression is unclear. It
|
|
may depend on user expectation, prior announcements, and whether the
|
|
university is public or private.
|
|
The legality is, however, irrelevant. The duty of the University is
|
|
not to suppress everything it legally can; rather it is to support the
|
|
free and open investigation and expression of ideas. This is the ideal
|
|
of academic freedom. In this role, the University acts a model of how
|
|
the wider world should be. (In the world of computers, universities are
|
|
perhaps the most important model of how things should be).
|
|
If you are interested in discussing this issues, or if you have
|
|
first-hand experience with academic suppression on computers or
|
|
networks, please join the mailing list.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
one with nintendo
|
|
halcyon symbiosis
|
|
hand thinks for itself
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
All I Really Need to Know I Learned from My Computer
|
|
|
|
All I really need to know about how to live and what to do and how to be I
|
|
learned right here in the CAEN labs. Illumination was not at the top of the
|
|
graduate school mountain, but right there in front of the computer
|
|
monitors. These are the things I learned. Everything you need to know is
|
|
here somewhere:
|
|
|
|
1. Share all your executables.
|
|
2. Pay for your shareware.
|
|
3. Don't hit the computer.
|
|
4. Back up files after you have found them.
|
|
5. Clean up your own messy desktop.
|
|
6. Don't copy software that is not yours.
|
|
7. Make a smiley when you send someone a nasty message.
|
|
8. Wash your hands before you type.
|
|
9. Flush your buffers.
|
|
10. M&Ms and a cold can of Coke are good for you.
|
|
11. Live a student's life--learn some and think some and
|
|
MacDraw and IPaint and Readnews and play Tetris and hack
|
|
every day some.
|
|
12. Take a break every two hours from staring at the terminal.
|
|
13. When you go out in the world, watch out for network traffic,
|
|
hold connections and stick together.
|
|
14. Be aware of wonder. Remember the little bytes in the chip:
|
|
The code goes in and the graphics come out and nobody
|
|
really knows how or why, but computers are all like that.
|
|
15. Pets and Lisas and DN350s and even the little bytes in the
|
|
chip all die. So do we.
|
|
16. And then remember the Computer Reference Manuals and the
|
|
first command you learned--the biggest command of all--Quit.
|
|
|
|
by Ann Gordon (anng@caen.engin.umich.edu)
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
samurai fighter
|
|
keyboard and mouse are his sword
|
|
digital battles
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
THE PRODIGY SAGA CONTINUED....REDUX....ENCORE....
|
|
|
|
[Prodigy continued to be a main subject of conversation on the net over
|
|
the past two weeks. Here is a selection of one exchange of views on
|
|
comp.org.eff.talk.]
|
|
--
|
|
From: brad@looking.on.ca (Brad Templeton)
|
|
|
|
In article <14193.281F5781@fidogate.FIDONET.ORG>
|
|
Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings) writes:
|
|
>It's easy to support free-speech issues on "safe" subjects
|
|
>-- the real test is when it is an unpopular one, or even one
|
|
>you don't agree with.
|
|
|
|
I agree with this 100%. It's one of the strongest parts of my personal
|
|
philosophy.
|
|
|
|
But this is not a free-speech issue, so it is not relevant.
|
|
|
|
People do not understand that freedom of the press (and Prodigy is press)
|
|
has two very important components:
|
|
a) Nobody can tell you what not to print (freedom from censorship)
|
|
b) Nobody can tell you what *to* print. (editorial control)
|
|
|
|
Both are important. To insist that Prodigy allow gay/lesbian discussion
|
|
against their will is not much different from forbidding them from having
|
|
gay/lesbian discussion if they want it.
|
|
|
|
Congress shall make no law abridging the freedom of the press. That's no
|
|
law in *either* direction.
|
|
|
|
--
|
|
|
|
From: lee@wang.com (Lee Story)
|
|
In-Reply-To: brad@looking.on.ca's message of 4 May 91
|
|
|
|
Well sorry, Brad, but it's not clear to many of us that a service like
|
|
Prodigy is self-evidently "press", as you seem to claim. In the part
|
|
of the service which presents (publishes) advertisements (mostly!) and
|
|
Prodigy-initiated or Prodigy-contracted informative articles (rarely),
|
|
they would seem to deserve the same protections offered to the print
|
|
and broadcast media.
|
|
|
|
But in their provision of email service they would seem to be merely a
|
|
by-subscription carrier, and their unpleasant lack of interfaces to
|
|
other carriers does not disguise that fact. I don't see why the same
|
|
protections offered to mail and telephone subscribers shouldn't apply.
|
|
And I don't see why bulletin boards to which subscribers are welcome to
|
|
contribute shouldn't be considered either (1) simply useful extensions
|
|
of email, or (2) publishing ventures, but ones in which the subscribers
|
|
are the publishers and Prodigy remains the carrier.
|
|
|
|
Isn't some scheme like this simple and fair enough to be worth
|
|
codifying as law, and the added marketability of email and bulletin
|
|
boards sufficient to encourage commercial services to provide them
|
|
even if they aren't allowed to control the contents?
|
|
|
|
(By the way, I think the trashy, ad-oriented nature of Prodigy has
|
|
encouraged many of us to criticize them for practices that would
|
|
raise few complaints on GEnie, CIS, etc. They may be doing us a
|
|
real service.)
|
|
--
|
|
From: brad@looking.on.ca (Brad Templeton)
|
|
|
|
I have seen no proof of Prodigy doing anything but charge for their E-mail.
|
|
They are not press, but an E-mail provider, when it comes to E-mail.
|
|
|
|
But in all the public areas of the system, they are indeed press, and
|
|
have explicitly said and acted in such a fashion at all times as far as I
|
|
can tell. I am not sure how other people have gotten any other impression.
|
|
|
|
Prodigy screens everything posted in the public areas. It's 100% edited.
|
|
How can you consider them anything but press?
|
|
--
|
|
[The discussion continues in comp.org.eff.talk.]
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
DAT arrives
|
|
frequency notch treachery
|
|
people are not fooled
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
S.266: WHAT YOU CAN DO
|
|
|
|
From: metzger@watson.ibm.com (Perry E. Metzger)
|
|
|
|
[Editor's Note:After sending a letter to Biden's office protesting
|
|
the language of S.266, Mr. Metzger received, as did many others,
|
|
a form letter reply.In comp.org.eff.talk, this is what he did next.]
|
|
|
|
I actually bothered to follow up on my (identical) form letter from
|
|
Sen. Biden's office.
|
|
|
|
I spoke to John Bentivoglio, who is on the Senator's Judiciary
|
|
committee staff (not his personal staff), who claims to have been the
|
|
person who drafted the letter that went out on Joe Biden's signature.
|
|
|
|
He's more or less unmovable, though he is friendly.
|
|
|
|
He has already heard from lots and lots of people from the net about
|
|
this. His claim is more or less this: the stated section of the law is
|
|
intended more to get communications providers to help with the tapping
|
|
of things like Cellular Phones and the like, which he claims is now
|
|
difficult. (All of us on the net, of course, know you can tap a
|
|
cellular phone with a radio scanner and some patience, but never mind
|
|
that). He also claims that they understand that there are technical
|
|
reasons making the provisioning of back doors into cryptosystems
|
|
difficult, and that is the reason for the "sense of congress" thing.
|
|
He also claims that this is not the proverbial crack in the dike, and
|
|
that the Senator has no intention of following through with additional
|
|
legislation to enforce a ban on secure cryptosystems.
|
|
|
|
Personally, I have no idea whether to believe him. My gut says, never
|
|
trust a politico, and that he is trying to sell me a bridge. That's not
|
|
the part that matters, though. The part that matters is whether or not
|
|
we can still do something to stop this clause from getting through.
|
|
|
|
My suggestion is that we, the UseNetters, organize an attempt to get
|
|
S.266 Section 2201, and S.618 Section 545, discussed in a
|
|
congressional hearing.
|
|
|
|
My suggestion: Call up as many of the following Senators as you can.
|
|
(Maybe you can leave out Biden, he's probably useless at this point.)
|
|
Ask to speak to an actual human on their staff for a few minutes;
|
|
don't just register a complaint with a random bill. Say something like
|
|
"I'd like to speak to a member of the senators staff about a bill
|
|
coming before the Judiciary committee that I am very concerned about."
|
|
When you get someone, calmly and quietly tell them why you oppose
|
|
S.266 section 2201 and S.618 section 545. (the wording in both is
|
|
identical, and be sure to mention that the two sections are
|
|
identical). Explain to them that there are lots of other people who
|
|
think the same way and tell them you would like to see hearings held
|
|
where people who are members of prominent organizations like the
|
|
Electronic Freedom Foundation, the ACLU, and other similar groups
|
|
would be given a chance to oppose the section. Be nice; these men are
|
|
the ones who we have to count on to rescue us. (Gawd help us all!)
|
|
|
|
Here, again, is the text of what we are opposing, which is identical
|
|
in both S.266 sec. 2201 and S.618 sec. 545:
|
|
|
|
----------------------------------------------------------------------
|
|
COOPERATION OF TELECOMMUNICATIONS PROVIDERS WITH LAW ENFORCEMENT
|
|
|
|
It is the sense of Congress that providers of electronic communications
|
|
services and manufacturers of electronic communications service equipment
|
|
shall ensure that communications systems permit the government to obtain
|
|
the plain text contents of voice, data, and other communications when
|
|
appropriately authorized by law.
|
|
----------------------------------------------------------------------
|
|
|
|
The members of the Senate Judiciary Committee, which will be acting on
|
|
these bills, are:
|
|
|
|
Chair: Joseph R. Biden, Delaware
|
|
|
|
Edward M. Kennedy, Massachusetts
|
|
Howard M. Metzenbaum, Ohio
|
|
Dennis DeConcini, Arizona
|
|
Patrick J. Leahy, Vermont
|
|
Howell Heflin, Alabama
|
|
Paul Simon, Illinois
|
|
Herbert Kohl, Wisconsin
|
|
Strom Thurmond, South Carolina
|
|
Orrin G. Hatch, Utah
|
|
Alan K. Simpson, Wyoming
|
|
Charles E. Grassley, Iowa
|
|
Arlen Specter, Pennsylvania
|
|
Hank Brown, Colorado
|
|
|
|
The phone number of the U.S. Senate Switchboard, which will get you
|
|
any of these men's staff's, is...
|
|
|
|
(202)-224-3121
|
|
|
|
Their specific numbers and addresses are...
|
|
|
|
DEMOCRATS:
|
|
|
|
Senator Joseph Biden (Del)
|
|
Suite 221
|
|
Russell Building
|
|
U.S. Senate, Washington DC 20510 <-- for all of them
|
|
(202) 224-5042
|
|
|
|
Senator Edward Kennedy
|
|
Suite 315
|
|
Russell Building
|
|
(202) 224-4543
|
|
|
|
Senator Howard Metzenbaum (Ohio)
|
|
Suite 140
|
|
Russell
|
|
(202) 224-2315
|
|
|
|
Senator Dennis DeConcini (Arizona)
|
|
Suite 328
|
|
Russell
|
|
(202) 224-4521
|
|
|
|
Senator Patrick Leahy (Vermont)
|
|
Suite 433
|
|
Russell
|
|
(202) 224-4242
|
|
|
|
Senator Howell Heflin (Alabama)
|
|
Suite 728
|
|
Russell
|
|
(202) 224-4124
|
|
|
|
Senator Paul Simon (Illinois)
|
|
Suite 462
|
|
Dirksen Building
|
|
(202) 224-2152
|
|
|
|
Senator Herbert Kohl (Wisconsin)
|
|
Suite 702
|
|
Russell
|
|
(202) 224-5653
|
|
|
|
REPUBLICANS:
|
|
|
|
Senator Strom Thurmond (South Carolina)
|
|
Suite 218
|
|
Russell
|
|
(202) 224-5972
|
|
|
|
Senator Orrin Hatch (Utah)
|
|
Suite 135
|
|
Russell
|
|
(202) 224-5251
|
|
|
|
Senator Alan Simpson (Wyo)
|
|
Suite 261
|
|
Dirksen Bldg
|
|
(202) 224-3424
|
|
|
|
Senator Charles Grassley (Louisiana)
|
|
Suite 135
|
|
Hart Bldg
|
|
(202) 224-3744
|
|
|
|
Senator Arlen Specter (Pennsylvania)
|
|
Suite 303
|
|
Hart Bldg
|
|
(202) 224-4254
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
oh no godzilla
|
|
guns and planes cannot stop him
|
|
tokyo is ablaze
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
COMPUTING & VALUES CONFERENCE, AUG 12-16
|
|
|
|
The National Conference on Computing and Values will convene August
|
|
12-16, 1991, in New Haven, CT. N C C V / 91 is a project of the
|
|
National Science Foundation and the Research Center on Computing and
|
|
Society. Specific themes (tracks) include
|
|
|
|
- Computer Privacy & Confidentiality
|
|
- Computer Security & Crime
|
|
- Ownership of Software & Intellectual Property
|
|
- Equity & Access to Computing Resources
|
|
- Teaching Computing & Values
|
|
- Policy Issues in the Campus Computing Environment
|
|
|
|
The workshop structure of the conference limits participation to
|
|
approximately 400 registrants, but space *IS* still available at this
|
|
time (mid-May).
|
|
|
|
Confirmed speakers include Ronald E. Anderson, Daniel Appleman, John
|
|
Perry Barlow, Tora Bikson, Della Bonnette, Leslie Burkholder, Terrell
|
|
Ward Bynum, David Carey, Jacques N. Catudal, Gary Chapman, Marvin
|
|
Croy, Charles E. M. Dunlop, Batya Friedman, Donald Gotterbarn,
|
|
Barbara Heinisch, Deborah Johnson, Mitch Kapor, John Ladd, Marianne
|
|
LaFrance, Ann-Marie Lancaster, Doris Lidtke, Walter Maner, Diane
|
|
Martin, Keith Miller, James H. Moor, William Hugh Murray, Peter
|
|
Neumann, George Nicholson, Helen Nissenbaum, Judith Perolle, Amy
|
|
Rubin, Sanford Sherizen, John Snapper, Richard Stallman, T. C. Ting,
|
|
Willis Ware, Terry Winograd, and Richard A. Wright.
|
|
|
|
The registration fee is low ($175) and deeply discounted air fares are
|
|
available into New Haven.
|
|
|
|
To request a registration packet, please send your name, your email AND
|
|
paper mail addresses to ...
|
|
|
|
BITNet MANER@BGSUOPIE.BITNET
|
|
InterNet maner@andy.bgsu.edu (129.1.1.2)
|
|
|
|
or, by fax ...
|
|
|
|
(419) 372-8061
|
|
|
|
or, by phone ...
|
|
|
|
(419) 372-8719 (answering machine)
|
|
(419) 372-2337 (secretary)
|
|
|
|
or, by regular mail ...
|
|
|
|
Professor Walter Maner
|
|
Dept. of Computer Science
|
|
Bowling Green State University
|
|
Bowling Green, OH 43403 USA
|
|
|
|
USENIX EFF BOF UPDATE: TIME CHANGE
|
|
|
|
At the Summer 1991 USENIX Conference, being held in Nashville, TN, from
|
|
10-14 June 1991, a Birds Of a Feather (BOF) session on the Electronic
|
|
Frontier Foundation (EFF) will be held. The EFF BOF will be held from
|
|
7-9pm on Tuesday, 11 June 1991. Note the time change! It will be
|
|
located in the Jefferson A room (the same room as the GNU BOF). The
|
|
EFF BOF will now be held *before* (instead of after) the GNU BOF.
|
|
|
|
We will give an update of recent EFF activities, an overview of cases
|
|
the EFF has been involved with and their outcomes, the EFF's missions,
|
|
current and future projects, etc. John Gilmore, a member of the EFF's
|
|
Board of Directors, will co-chair the BOF and will talk about some of
|
|
the work EFF has been doing on privacy technology, also known as
|
|
encryption, and the threats and promise we see in it. There will be a
|
|
general question and answer session at the end of the BOF.
|
|
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
FEEDBACK
|
|
|
|
[Here are a few of the comments received on Effector Online 1.05:]
|
|
|
|
From tachyon@ucscb.UCSC.EDU Sun May 26 07:59:28 1991
|
|
|
|
Just two quick, unpolished comments, so I'm mailing them rather than
|
|
posting them.
|
|
|
|
I'm surprised at the amount of ridicule Jim Warren aimed at people
|
|
who might not want their names on CPSR (or other) mailing lists, when
|
|
it would be a simple enough matter for CPSR to include something like
|
|
"We periodically send out announcements and other mailings to people
|
|
on our mailing list. Check here if you would prefer NOT to receive
|
|
these unsolicited mailings."
|
|
|
|
Mitch Kapor is being a little too quick in telling a Prodigy person
|
|
that the Well's conflict resolution methods do not involve
|
|
throwing people off the system, because I know that at least one
|
|
person HAS been thrown off the Well. However, as a sysop myself,
|
|
I know that these systems can be sitting ducks for people who, for
|
|
whatever reason, have decided to spend as much time as possible
|
|
insulting and harassing other users. I have thrown one user off
|
|
my own BBS for that reason.
|
|
|
|
----------
|
|
|
|
Subject: Cryptography, Mythology, and S. 266
|
|
|
|
In an article in Effector Online, Denise Caruso joins the crowd of people
|
|
all over the networks attacking a provision placed by Senator Biden into two
|
|
Senate bills (S. 266 and S. 618), which make it the "sense of the Senate" that
|
|
providers of encryption technology and communication services ensure that they
|
|
can provide, in response to proper court order, a clear-text version of any
|
|
material transmitted using their systems.
|
|
|
|
Caruso, and many others, have argued that such a law would require the use of
|
|
a "trap door", or in generally weakened cryptographic algorithms. THIS IS
|
|
COMPLETELY FALSE. What it mainly requires is record keeping.
|
|
|
|
The technical details get very complex, but in fact choosing a good crypto-
|
|
graphic algorithm is only the beginning of designing a usable cryptosystem.
|
|
Key distribution is as big a headache. In most proposed systems, one uses a
|
|
unique "session key" for each communication session. This key is provided to
|
|
the two participants by a central server. A server that recorded the keys it
|
|
assigned would have no problem with the provisions of these bills. Compromise
|
|
of the server is deadly to the entire system, whether it keeps records or not,
|
|
so this need imply no significant weakening of the system. It certainly does
|
|
not require the insertion of any trap door or other weakness into the under-
|
|
lying cryptographic algorithms.
|
|
|
|
The public-key-based systems that Caruso refers to, as far as I know, do NOT
|
|
use public key cryptography to encrypt most user data. Rather, they use it
|
|
to make the communication with the session-key server simpler. Today, and
|
|
for at least the near-term future, known public-key algorithms are too ex-
|
|
pensive and slow to use for bulk data. They can, however, be used in such
|
|
combined public/private key systems to get good performance with most of the
|
|
advantages of private key systems.
|
|
|
|
Why should anyone care about this technical detail? (By now I'm sure I've
|
|
lost the real flamers, who know nothing but how to repeat catch phrases like
|
|
"trap door".) Because basing an attack on S. 266 and such measures on some-
|
|
thing that is verifiably false is a good way to lose arguments. Badly.
|
|
|
|
Suppose someone introduced a bill requiring the registration of all computer
|
|
equipment. Would you argue against it on the grounds that only MS/DOS systems
|
|
could meet the registration requirement?
|
|
|
|
The problems with S. 266 and similar measures are NOT technical. If you want
|
|
to object to them, do so on the basis of rights to privacy, protection of free
|
|
speech, or whatever. Don't let the argument get onto the ground of what is
|
|
technically feasible, or you'll lose.
|
|
-- Jerry
|
|
From: Jerry Leichter <leichter@LRW.COM>
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
ENDNOTES
|
|
|
|
Effector Online would like to thank Damon A. Koronakos and Brian Roberts
|
|
at stanford.edu for the Hi-Tech Haikus that grace this issue.
|
|
|
|
We also would like to extend our thanks to Leila Gallagher, a great
|
|
volunteer and true pioneer of the Electronic Frontier. Without her constant
|
|
and generous efforts here at the office, the EFF would have floundered during
|
|
our first year.
|
|
|
|
We are always interested in news, pointers, tall tales, quotes
|
|
jokes and brilliant strokes related to life on the Electronic
|
|
Frontier.
|
|
Write to us with comments and criticism, or write for us if you
|
|
prefer. Any letters or stories can be posted to comp.org.eff.talk,
|
|
or sent directly to the editor of Effector Online: van@eff.org.
|
|
We'll be back in a fortnight with another edition.
|
|
|
|
In the meantime, you are still on the Electronic Frontier.
|
|
Be careful out there.
|
|
-==--==--==-<>-==--==--==-
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|