The software was classed as munitions and one needed an arms dealer’s license to publish it, including online. The creator of PGP published the full source code as a book, as these are covered under first amendment rights.

  • thebudman420@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 day ago

    The whole thing reads like this is weak encryption that doesn’t actually work and that is what they wanted people to have for that false sense of security. That’s wild

  • DeathByBigSad@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    85
    arrow-down
    3
    ·
    2 days ago

    Fun fact: They made encryption on Ham/GMRS radios illegal because they didn’t want the average citizenry to have access to secure off-grid comms without government spyware on networks that they control.

    Reject Smarphones, Return to Amateur Radios. Just modify some radios, add a raspberry pi to do enccyption on the voice before it gets transmitted.

    THEY CANT ARREST US ALL! (seriously tho, I haven’t heard of the FCC actually doing anything, unless you were jamming the airport radios or something crazy)

    • missfrizzle@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      19
      ·
      edit-2
      1 day ago

      I think FCC still takes it pretty seriously.

      just use Meshtastic/LoRa. you can use encryption and you don’t need a Ham license. your output power is limited but I’ve heard of people getting 50+ miles of range for reception.

      specifically, for ham you’re not allowed to obscure the meaning of your transmissions. this means no:

      • symmetric cryptography
      • numbers stations (one-time pad ciphers)
      • communicating in codewords (“the Falcon has left the nest, over!”

      but you can use:

      • compression
      • commercial telegraph codes (e.g. 22415 = “Partly cloudy with a chance of showers”), as long as you’re using a public codebook
      • message authentication codes (to prevent forging messages)
      • (arguably) asymmetric cryptography for signatures, identity challenge/response
      • encrypted control messages for hobbyist satellites (special exemption)

      so authentication is possible, just not privacy.

    • bigfondue@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      1 day ago

      The primary reason is the FCC can’t tell if the encrypted transmissions are commercial or otherwise illegal. The amateur bands would be full of high frequency trading brokerages, drug traffickers, and spies.

    • Natanael@infosec.pub
      link
      fedilink
      English
      arrow-up
      25
      ·
      2 days ago

      It’s illegal on licensed HAM channels, but legal on unlicensed channels like the 2.4 and 5Ghz ranges

      Don’t ask me why the distinction still remains

      • missfrizzle@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 day ago

        international treaties, for one. second because lack of encryption discourages commercial/non-hobbyist use. third because the spirit of Ham is for Hams to all listen and transmit to each other.

      • josefo@leminal.space
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        Hell is a fun project for me too lol. I wonder if I could layer it with ggwave for shit and jiggles

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 days ago

      …they definitely can arrest a bunch of people. A better way would be to challenge it in court.

      Or you could use other protocols like LoRaWAN

    • GreenShimada@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 days ago

      Encryption using IP over HAM is still illegal - you can’t access Lemmy because it’s an HTTPS site, because we live in the 21st century.

      • InFerNo@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        Nothing stops anyone from running a webserver without ssl, there might be an instance that does it

        • GreenShimada@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          1 day ago

          I know, the point is that you’re broadcasting over the radio that you’re encrypting the data over the one medium were it’s illegal to encrypt the data because the FCC thinks it’s still 1989 or whatever when it comes to amateur radio. So it’s not just that you’re doing something illegal, you’re using a registered call sign and a really loud, easily triangulatable signal to do it. It’s like putting a movie poster-sized sign on your fence that says “Rattlesnake venom for sale, inquire within.” It’s not a sustainable practice.

          Ultimately, the amateur radio crowd needs to get this law 47 CFR 97.113 changed to allow an exception for encrypted internet over radio and allow for modern communications standards. Personally, I expect that it would only take one House Rep willing to score any sort of win with rural voters for this to work right now.

  • DandomRude@lemmy.world
    link
    fedilink
    English
    arrow-up
    188
    arrow-down
    1
    ·
    edit-2
    2 days ago

    Yes, that was indeed a very interesting story:

    Zimmermann challenged these regulations in an imaginative way. In 1995, he published the entire source code of PGP in a hardback book, via MIT Press, which was distributed and sold widely. Anyone wishing to build their own copy of PGP could cut off the covers, separate the pages, and scan them using an OCR program (or conceivably enter it as a type-in program if OCR software was not available), creating a set of source code text files. One could then build the application using the freely available GNU Compiler Collection. PGP would thus be available anywhere in the world. The claimed principle was simple: export of munitions—guns, bombs, planes, and software—was (and remains) restricted; but the export of books is protected by the First Amendment. The question was never tested in court with respect to PGP. In cases addressing other encryption software, however, two federal appeals courts have established the rule that cryptographic software source code is speech protected by the First Amendment (the Ninth Circuit Court of Appeals in the Bernstein case and the Sixth Circuit Court of Appeals in the Junger case)…

    (Source)

    • AnarchistArtificer@slrpnk.net
      link
      fedilink
      English
      arrow-up
      9
      ·
      2 days ago

      Thank you. I’ve watched a bunch of Darkness diaries (Usually ones that people on external sites say “this one is really good, you should watch it”), but I’ve found it hard to get into (the perils of a podcast’s large backlog being compared to a highlight reel). I haven’t watched this episode though, so I look forward to checking it out

  • Itdidnttrickledown@lemmy.world
    link
    fedilink
    English
    arrow-up
    31
    ·
    2 days ago

    Also anyone with a civilian GPS couldn’t use it for precise measurement because they added a deliberate error into them. It also took twenty to thirty minutes to download a gif of Samantha Foxes tits. PGP was really popular then. There were version on every dial in BBS in the US. Without a doubt someone/anyone overseas that wanted it, had it. It was a joke of security theater and didn’t last.

    • Dasus@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      2 days ago

      It wasn’t an error, as such. They had just limited the resolution available for most people. It was called “Selected Availability”.

      • Itdidnttrickledown@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        It was described at the time by every one including the government as a deliberate error. I knew it had a name attached to it but it is inconsequential. It caused the readings to jump around randomly making the resolution somewhere are fifty to seventy five feet. Bill the blowjob bubba clinton had it turned off during his administration.

  • RaccoonBall@lemmy.ca
    link
    fedilink
    English
    arrow-up
    18
    ·
    2 days ago

    Yep I remember the scary text the came with certain software threatening superjail if you sent the exe overseas

  • kinther@lemmy.world
    link
    fedilink
    English
    arrow-up
    21
    ·
    2 days ago

    I had one of those t-shirts in the early 00s. Got it at a Goodwill and hung it on my wall for a while

    • shane@feddit.nl
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      I got one in the late 1990s. I wore it on a few trips from the US to Europe and was happily never jailed.

  • wulrus@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    ·
    edit-2
    2 days ago

    An annoyance that came shortly after was that they were not allowed to ship the Java Runtime Environment / Development Kit with a javax.crypto library that allowed for algorithms stronger than DES (such as AES, Twofish, Blowfish, …), or long passwords, iirc.

    There was some way to download something extra (Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files) and fiddle it in, but with regulation in the US, I think.

    I was quite sad when I made one of my early programs based on that and it turned out to be useless to US citizens, and hard to use for everyone else. I think I made a bouncycastle-based version later, but it was basically a full rewrite.

    Edit: I’m starting to remember more absurdities of the time: Even with the JCE, the best algorithm for symmetric encryption was 3DES, which was not a legal requirement, just laziness of Sun Microsystems. While it was somewhat safe, it was less than ideal and really slow.

    • Ephera@lemmy.ml
      link
      fedilink
      English
      arrow-up
      13
      ·
      2 days ago

      I made a bouncycastle-based version later

      I enjoy how nonsensical this must sound to people unfamiliar with Java. 🙃

      • wulrus@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        2 days ago

        lol right, must sound like Treknobabble but for the 2000s. Heck, for kids these days, it’s probably as gibberish as original Treknobabble.

        I bet distant future archaeologist, be they human or alien, will assemble the bits and pieces like this: Child worker programmers would work in these inflatable tiny castles on the soft floor with their laptops. That was the last attempt to revive feudalism. Why it didn’t catch on to other office jobs remains lost in the past.

    • Tja@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      Fun fact, Google pay and other “modern” payment processors still had to use 3DES until 2020 at least (might still do, I got out of the industry).

      • Dasus@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        2 days ago

        that came to prominence in May 2007 is an example of a number claimed to be a secret, and whose publication or inappropriate possession is claimed to be illegal in the United States

        The article doesn’t even assert it’s illegal. Just asserts someone has said so.

        • Danitos@reddthat.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          2 days ago

          AACS did push with DMCA complains to remove any referente of the number back in the day. However, another article claims “No one has been arrested or charged for finding or publishing the original key”.

          You are right, thanks for the correction, will edit my comment.

    • Jerkface (any/all)@lemmy.ca
      link
      fedilink
      English
      arrow-up
      17
      ·
      edit-2
      2 days ago

      It’s shocking to me the major events of my life that have fallen into the memory hole. It’s not just that younger people haven’t learned about them, older people have just filtered them out. It’s like we live in an eternal now that stretches infinitely in both directions, until it abruptly changes and yet another new reality becomes our new past and future.

      • Alcoholicorn@mander.xyz
        link
        fedilink
        English
        arrow-up
        5
        ·
        2 days ago

        That’s not new, often you can look at events boomers claim to have witnessed and find actual accounts completely different, like soldiers returning home from Vietnam and getting spit on and called baby killer, feminists burning bras.

        You look back further and there’s so much discrepancy between accounts of the civil war and then reconstruction, and then second rise of the kkk during these events and just 2 decades later.