Calls on the armies of the Net to help find prior art
Last fall Wang sued Netscape for infringing a 1985 patent  that it claims covers the Save As command and the idea of bookmarks in a browser . Now that Netscape enjoys the loyalty of tens of thousands of developers, it is asking this community for help in finding prior art to bust the patent. Netscape puts its request in provocative terms on the top page of mozilla.org , suggesting a connection between the lawsuit and Wang's recently expanded alliance with Microsoft. Neither news stories  nor discussion in the developer community  have turned up any indication that Microsoft actually has anything to do with this lawsuit. thread("spx") ?>
In the early 1990s Wang was in Chapter 11 and seemed to be systematically mining its patent portfolio for revenue. The company sued a number of chip makers who it said infringed its patents on the SIMM technology widely used in memory modules . In 1993 Wang filed against Kodak for infringing imaging software patents. On the same day Wang sued Microsoft over OLE technology used in imaging products from a Microsoft partner, Watermark, which was also named in the suit. Today's close Microsoft/Wang cooperation stems from discussions arising out of that lawsuit.
Another court ruling affirms their "common carrier" status
A federal judge has ruled  that Internet service providers can't be sued in civil courts for the editorial content they carry. U.S. District Court Judge Paul L. Friedman's ruling was based on wording included in the Communications Decency Act that specifically exempts ISPs from liability for content. The ruling came in the libel suit filed by White House advisor Sidney Blumenthal against the Internet journalist Matt Drudge for a story in his Drudge Report. AOL was named in the suit because it carries that report; but of course Drudge's Web site can be accessed from any ISP. By going after AOL Blumenthal was invoking the Willy Sutton principle .
In a tough week Redmond does OK in court
There hasn't been such a convergence of firepower on Microsoft since late last year . Then, the Jusice Department filed a contempt of court motion when Microsoft reacted to Judge Thomas Penfield Jackson's antitrust order with a policy of "compliance with a raised middle finger," in the ringing phrase of the SJ Mercury News.
Feed. Feed magazine, smarting from the LA Times's scoop on Microsoft's stealth PR campaign , claimed it had obtained copies of some of the concocted letters prominent people were supposed to write to their local editors. Read them here , but please don't take the parody seriously.
Appeal. On 4/21 Microsoft met the DoJ in court before a 3-judge panel  and argued its appeal of the December 11 ruling and of Jackson's appointment of a special master in the case. The company had pulled its now predictable last-minute marketplace concession by announcing its firm intention to ship a Windows 98 version without Active Channel Bar  (as mentioned aside in TBTF for 1998-03-09 ). Observers agreed  that the judges handled the DoJ lawyers far more roughly than Microsoft's.
Dole. The anti-Microsoft lobby fronted by Bob Dole, mentioned in TBTF for 1997-12-27 , has come out shooting. It's called ProComp  and in the effort Dole is joined by Robert Bork, one of the men who didn't make it to the Supreme Court bench on Ronald Reagan's watch. Just don't call them Bole and Dork.
Nader. On 4/20 consumer activist Ralph Nader and his colleague Jamie Love took a broad look  at Microsoft's business practices and global strategy in the Cato Institute's Policy Forum on Antitrust and Microsoft. They reminded us of the days when competition was hot in the DOS market, when Microsoft was rumored to manipulate features of the OS to the detriment of its competitors:
Caldera. An overlooked lawsuit dating from those long-ago days of DOS competition is re-emerging as the one to watch. Caldera, who nowadays sells a commercial Linux product, also owns the rights to DR-DOS. Caldera sued Microsoft over its tactics leading up to the total dominance of DOS and its sublimation into the new operating system, Windows 95. This summary from NC World magazine  nicely wraps up the case so far. Thanks to Jimmy Liberato <liberato at cs dot nps dot navy dot mil> for pointing out this lawsuit.
When can government agents dispense with the nicety of a search warrant?
Since the days of the Clipper Chip John Gilmore has been wondering why agents of the US government were always so careful to use the phrase "lawful access" when talking about recovering users' secret keys. Did they mean a warrant issued by a judge? Then why didn't they ever say that? Now Gilmore believes he has found his long-sought loophole in Executive Order 12333 , signed by Ronald Reagan in 1981. This so-called "keystone document" redefined the US intelligence community. The salient portion for Gilmore's analysis is:
|Fourth Amendment to the US Constitution (1791)|
|The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.|
As PGP has moved from freeware to buttoned-down corporate, some cypherpunks are re-examining its trustworthiness
Phil Zimmermann's freeware program Pretty Good Privacy was the Promethean gift of strong cryptography early in this decade . Its source code was published from the first so that those knowledgeable in such matters could assure themselves that the crypto was strong and the code contained no back doors to compromise security. Someone, not Zimmermann, posted PGP to the Net in 1991. In 1993 the Justice Department commenced an investigation into whether Zimmermann had broken any US laws in this affair -- though no one doubted his claim that he was not the one who posted PGP. After the DoJ dropped its case in 1996 Zimmermann formed PGP, Inc.; the company continued to publish full source code and to distribute a free version of PGP. It was when PGP, Inc. was acquired by McAfee Associates last December  that dyed-in-the-wool cypherpunks began questioning whether PGP deserved their continuing trust. When the newly merged company, called Network Associates, acquired Trusted Information Systems in February  the doubts multiplied.
Now Tom Paine <pnet at proliberty dot com> has put together an exhaustive analysis and resource list  on PGP, Inc. and its roots in Zimmermann's freeware program. It aims to answer the question "Can we trust PGP, Inc.?" -- or at least to provide research sources so that you can answer this question for yourself. Along the way you get a pretty good tutorial in the technology of public-key encryption, why factoring is hard, what key recovery means to personal privacy, background on the Key Recovery Alliance, insight from SEC filings on who controls PGP's new corporate master, etc. The site also addresses matters of more practical import to everyday users, such as: Which version of PGP should you use? What compatibility issues exist with older versions of the software? Why should you use encryption even if it's not perfect? The perspective is that of the hardcore, skeptical cypherpunk and the research is thorough and orderly.
My own view? I still trust PGP and use its commercial version 5.5.1. But I'm watching, following the only piece of advice Ronald Reagan ever uttered with which I unconditionally agree: Trust, but verify.
Bestowing raspberries on sites that can't be bothered, since 1997
So many exclusionary sites, so little time. Readers have been busily sending in nominations for the Hall of Shame  to shine a spotlight of (we hope) unwelcome publicity on the lazy or mean-spirited Web site owners who refuse to welcome all of their visitors equally. New additions are:
The Web is not like paper. Explore the ramifications here
Dan Bricklin <danb at trellix dot com> has thought a lot in recent years about authoring for hypertext environments. His company  makes tools to ease this very task , . Now Bricklin has put up a new site, Good Documents , for discussion on how to write business documents for intranets and the Internet. I don't know of another site with such a sharp focus on presenting information written by an individual to convey ideas and knowledge to others, and not on the mechanics, formatting, or tools of Web construction. Do pay a visit, and contribute to the discussion, if you care about writing for this new medium.
And I got it bad
When the only tool you have is a hammer everything starts to look like a nail. The whimsical Foundation for the Mis-Application of Computer Languages , creation of Alex Hunsley <lard at tardis dot ed dot ac dot uk>, celebrates the use of hammers to pound in earthworms. A perfect example is a Unix text editor implemented by FoMCoL member-in-good-standing Claudio Calvelli <clc at assurdo dot com>  using nothing but /bin/sh and /bin/dd . Calvelli has also built a Turing machine from the same unlikely timber . The site for these unnatural acts sports a domain name from the island of Saint Helena: dd.sh.
I picked up the FoMCoL reference from Need to Know . Anyone who followed each link in a single issue of NTK would surely go mad.
In closing, a few examples from my extensive historical collection of email signatures (no .sig? go .fig) clustered around languages and text editors.
TBTF home and archive at http://www.tbtf.com/ . To subscribe send the message "subscribe" to firstname.lastname@example.org. TBTF is Copyright 1994-1998 by Keith Dawson, <dawson dot tbtf at gmail dot com>. Com- mercial use prohibited. For non-commercial purposes please forward, post, and link as you see fit. _______________________________________________ Keith Dawson dawson dot tbtf at gmail dot com Layer of ash separates morning and evening milk.