1994-01-20 - Re: alternative to Fair Cryptosystems

Header Data

From: fb@cyberg.win.net (Francis Barrett)
To: cypherpunks@toad.com
Message Hash: 12d38645fe1f9e42a0bf5fcd550f44a6da62450549fe5e8cb50d1b601fae22fe
Message ID: <55@cyberg.win.net>
Reply To: N/A
UTC Datetime: 1994-01-20 20:34:20 UTC
Raw Date: Thu, 20 Jan 94 12:34:20 PST

Raw message

From: fb@cyberg.win.net (Francis Barrett)
Date: Thu, 20 Jan 94 12:34:20 PST
To: cypherpunks@toad.com
Subject: Re: alternative to Fair Cryptosystems
Message-ID: <55@cyberg.win.net>
MIME-Version: 1.0
Content-Type: text/plain



>You can have your surveillance agency (or agencies which need to cooperate)
>publish their own RSA keys (big ones, presumably), and all the good little
>boys and girls who want to prove how obedient and conformist they are can
>include those keys as recipients when they encrypt messages.  If there are
>to be multiple agencies which have to cooperate, the PGP or RIPEM software
>would have to change to split the message key by XOR with ranno pieces,
>but in the meantime, you could just include the FBI in your list of recipients
>and save everybody the hassle of having to get pieces to put together.
>
>Simple -- direct -- speaks right to the gov't desire.  What could be wrong
>with this?

And anyone who didn't include a surveillance agency in the list of
message recipients would of course be demonstrating that they were up
to no good and should be investigated.  How diabolically clever.

Next let's "voluntarily" switch to postcards for all snail mail. :)

---------------------------------------------------------------
Francis Barrett, F.R.C. |  Thou canst not travel on the path  |
The Cybernetics Guild   |  before thou hast become the Path   |
fb@cyberg.win.net       |  itself.                            |
---------------------------------------------------------------






Thread