1994-02-08 - Re: Clipper Qs

Header Data

From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
To: orion@crl.com
Message Hash: 0f1b5e493f9d41c0c0efe8d9a593ada87d718c140e373828716b2d2c3dd410e9
Message ID: <9402080909.AA04864@anchor.ho.att.com>
Reply To: N/A
UTC Datetime: 1994-02-08 09:10:45 UTC
Raw Date: Tue, 8 Feb 94 01:10:45 PST

Raw message

From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
Date: Tue, 8 Feb 94 01:10:45 PST
To: orion@crl.com
Subject: Re:  Clipper Qs
Message-ID: <9402080909.AA04864@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text/plain


Doesn't matter if you switch CLipper Chips - the chip squawks its serial 
number when it starts a session, and they simply get the keys for *all*
clipperphones that they overhear while wiretapping.  That way they don't
need to keep track of who's got what chip (which is impossible,
since you could switch with your neighbor), though that may be some help
if they happen to know some eavesdropping victim's serial number
and are tapping all the pay phones in an area.

As far as reprogramming goes, no.  They're a fancy tamperproof design,
which they hope will make it difficult or impossible for people to get
the algorithm or the key out of.





Thread