16.27.1. Bypassing restrictions on commercial encryption packages by
not making them "commercial"
- public domain
- freely distributed
- after all, the basic algorithms are simple and don't really
deserve patent protection: money will not be made by the
originators of the code, but by the actual providers of
services (for transmission and storage of packets)
16.27.2. Noise and signals are often indistinguishable
- as with the LSB audio signal approach...unless the
government outlaws live recordings or dubs on digital
systems...
16.27.3. Timed-release files (using encryption) will be used to hide
files, to ensure that governments cannot remove material they
don't like
- easier said than done
16.27.4. Legal approaches will also be taken: fundamental
constitutional issues
- privacy, free speech, free association
16.27.5. The Master Plan to Fight Restrictions on Encryption
+ "Genie out of the bottle" strategy: deploy crypto widely
- intertwined with religions, games, whistleblower groups,
and other uses that cannot easily just be shut down
- scattered in amongst many other activities
- Media attention: get media to report on value of
encryption, privacy, etc.
+ Diffusion, confusion, and refusion
- Diffuse the use by scattering it around
- Confuse the issue by fake religions, games, other uses
- Refuse to cooperate with the government
- Free speech arguments: calling the discussions free speech
and forcing the government to prove that the free speech is
actually an economic transaction
+ links with religions, corporations, etc.
- private meetings protected
- voting systems
Next Page: 16.28 Things that May Hide the Existence of Crypto Anarchy
Previous Page: 16.26 How Crypto Anarchy Will Be Fought
By Tim May, see README
HTML by Jonathan Rochkind