{"id":448,"date":"2003-10-16T00:00:00","date_gmt":"2003-10-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/16\/us-will-not-enforce-encryption-laws\/"},"modified":"2021-12-30T11:37:20","modified_gmt":"2021-12-30T11:37:20","slug":"us-will-not-enforce-encryption-laws","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/16\/us-will-not-enforce-encryption-laws\/","title":{"rendered":"US &#8216;will not enforce&#8217; encryption laws"},"content":{"rendered":"<p>A pioneering attempt to overturn the US government&#8217;s Cold War-era laws restricting the publication of some forms of encryption code ended quietly on Wednesday when a federal judge dismissed the lawsuit &#8212; but only after assurances that the anticrypto laws would not be enforced.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>US District Judge Marilyn Hall Patel in San Francisco threw out the case after the Bush administration said it would no longer try to enforce portions of the regulations, according to parties involved in the proceedings.<\/p>\n<p>More info: [url=http:\/\/news.zdnet.co.uk\/business\/0,39020645,39117187,00.htm]http:\/\/news.zdnet.co.uk\/business\/0,39020645,39117187,00.htm[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-448","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=448"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/448\/revisions"}],"predecessor-version":[{"id":2935,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/448\/revisions\/2935"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}