1993-04-16 - circling the wagons

Header Data

From: derek@cs.wisc.edu (Derek Zahn)
To: cypherpunks@toad.com
Message Hash: a98cc0cfc9a4a70bce4d5612955285b71d17c4038165f898e7f679d154d12592
Message ID: <9304162000.AA29054@lynx.cs.wisc.edu>
Reply To: N/A
UTC Datetime: 1993-04-16 20:00:08 UTC
Raw Date: Fri, 16 Apr 93 13:00:08 PDT

Raw message

From: derek@cs.wisc.edu (Derek Zahn)
Date: Fri, 16 Apr 93 13:00:08 PDT
To: cypherpunks@toad.com
Subject: circling the wagons
Message-ID: <9304162000.AA29054@lynx.cs.wisc.edu>
MIME-Version: 1.0
Content-Type: text/plain



Assuming that the "Clipper chip" initiative isn't a teapot
tempest, I suppose we'd better start sharpening our rhetorical
knives.

Privacy arguments and sheer outrage will be useful, but it
seems to me that the "modern steganography" discussion from
a few weeks back offers an irrefutable argument:

  By performing rather simple camouflaging, it is possible
  to make an encrypted message undetectable by encoding
  it in (images, voice, any other signal that could plausibly
  contain noise).  This is rather easy to do, so those who
  REALLY want to hide what they're doing (terrorists, criminals,
  republican campaign staff) will still be able to do so.
  In fact, by encrypting the wrapper with your "Clipper"
  system, they look like they're hiding noting.  All that you
  are buying is a false sense of security.

derek






Thread