Date: Mon, 10 Feb 1997 14:10:50 -0800
Message-Id: <199702102210.OAA19896@pan.eng.sun.com>
From: Frank Yellin <fy@eng.sun.com>
To: java-security
Subject: Found on the net. . . .
For your amusement. Found on the 'net.
From: schneier@counterpane.com (Bruce Schneier)
Newsgroups: sci.crypt
Subject: Re: Applied Cryptography
Date: Mon, 10 Feb 1997 13:38:40 -0500
Organization: Counterpane Systems
Message-ID: <schneier-ya023080001002971338400001@news.visi.com>
References: <1997020822582874952@zetnet.co.uk>
In article <1997020822582874952@zetnet.co.uk>, David Hopwood
<hopwood@zetnet.co.uk> wrote:
> For those of us international terrorists, drug-dealers, and researchers who
> find getting crypto code from the US slightly inconvenient, I suggest doing
> an Infoseek search for "Applied Cryptography source code", which turned up
> this:
>
> http://www.fou.telenor.no/brukere/oyvind/applied_cryptography.html
>
For the record, I am shocked (shocked, mind you) that ANYONE would knowing
violate the IATR and export the source code from Applied Cryptography. I
consider
this an unwholsome and deplorable act, and am sure the perpetrators are without
either scruples or table manners. I hope that every ill-intented foreigner
continues to
use weak cryptography despite this dispicable occurance, and that the forces of
enlightened goodness within the National Security Agency will swiftly and
forcibly
bring the guilty parties to justice.
Bruce
**************************************************************************
* Bruce Schneier APPLIED CRYPTOGRAPHY, 2nd EDITION is
* Counterpane Systems available. For info on a 15%
* schneier@counterpane.com discount offer, send me e-mail.
*
* For Blowfish C code, see ftp.ox.ac.uk:/pub/crypto/misc/blowfish.c.gz
**************************************************************************
------- End of forwarded message -------