1993-09-19 - Re: NIST proposes software key escrow development

Header Data

From: khijol!erc@apple.com (Ed Carp)
To: doug@netcom.com (Doug Merritt)
Message Hash: 3164fdfed37fa5d7150ec35127abffb234867e403aa6579795b7c260b50b7b18
Message ID: <m0oeF8h-00021LC@khijol>
Reply To: <9309190211.AA17219@netcom.netcom.com>
UTC Datetime: 1993-09-19 03:15:39 UTC
Raw Date: Sat, 18 Sep 93 20:15:39 PDT

Raw message

From: khijol!erc@apple.com (Ed Carp)
Date: Sat, 18 Sep 93 20:15:39 PDT
To: doug@netcom.com (Doug Merritt)
Subject: Re: NIST proposes software key escrow development
In-Reply-To: <9309190211.AA17219@netcom.netcom.com>
Message-ID: <m0oeF8h-00021LC@khijol>
MIME-Version: 1.0
Content-Type: text


> Not necessarily. Zero knowledge proof techniques, for instance, can be
> applied to make source code as impenetrable as one wishes. This tends to
> carry a heavy runtime overhead, of course.

Could you go into more detail on this?  Thanks!
-- 
Ed Carp, N7EKG			erc@apple.com			510/659-9560
                            anon-0001@khijol.uucp
If you want magic, let go of your armor.  Magic is so much stronger than
steel!        -- Richard Bach, "The Bridge Across Forever"




Thread