[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Cryptography] Third amendment crypto defenses
- To: [email protected]
- Subject: [Cryptography] Third amendment crypto defenses
- From: [email protected] (grarpamp)
- Date: Fri, 7 Nov 2014 18:19:04 -0500
- In-reply-to: <CAOFDsm2z9hyumqkrHhwx5f3=oPdG-6jJdFNJzC6LME=OtptmhA@mail.gmail.com>
- References: <CAMm+LwjdGmAJ8fvNFMvNpk1fNnn5+wZyS4kyDTze-PAs2s7=OA@mail.gmail.com> <CAOFDsm2z9hyumqkrHhwx5f3=oPdG-6jJdFNJzC6LME=OtptmhA@mail.gmail.com>
On Fri, Nov 7, 2014 at 4:37 PM, Steve Furlong <[email protected]> wrote:
> On Fri, Nov 7, 2014 at 2:46 PM, Phillip Hallam-Baker <[email protected]>
> wrote:
>>
>> I think there is a reasonable interpretation
>> which would find that the military should not have anything to do with
>> such activities.
>
> Check the cypherpunks archives from 2001 or 2002. This is not a new idea.
http://www.metzdowd.com/mailman/listinfo/cryptography
Forwarding context to cpunks...
http://scholarship.law.wm.edu/wmborj/vol2/iss1/4
http://www.usatoday.com/story/opinion/2013/07/22/third-amendment-nsa-spying-column/2573225/
http://misguidedchildren.com/technology/2014/01/nsa-violating-3rd-amendment-with-snooping-tactics/10133