1994-12-09 - Question #1 to the community regarding National…

Header Data

From: “CRYPTO” <crypto@nas.edu>
To: alt-privacy@cs.utexas.edu
Message Hash: 3e13db0879651a52665f2ba56697eea9459b86aa5eb604b0ce9acab2a2d67a39
Message ID: <9411097869.AA786998597@nas.edu>
Reply To: N/A
UTC Datetime: 1994-12-09 15:46:37 UTC
Raw Date: Fri, 9 Dec 94 07:46:37 PST

Raw message

From: "CRYPTO" <crypto@nas.edu>
Date: Fri, 9 Dec 94 07:46:37 PST
To: alt-privacy@cs.utexas.edu
Subject: Question #1 to the community regarding National...
Message-ID: <9411097869.AA786998597@nas.edu>
MIME-Version: 1.0
Content-Type: text/plain


Subject:
Question #1 to the community regarding National Cryptography Policy
  As many of you know, the National Research Council is
  undertaking a study of national cryptography policy
  (description available on request to CRYPTO@NAS.EDU).
  This note is the first of a number of questions that will
  be posted to the Internet community in our attempt to solicit
  input on a broad scale.  Please circulate this request to anyone
  that you think might be able to contribute.

  The question of this posting is the following:

  How, if at all, do capabilities enabled by new and emerging
  technology in telecommunications (e.g., key-escrow
  encryption technologies, digital telephony) and electronic
  networking make it _easier_ for those who control that
  technology to compromise and/or protect the interests of
  individual end users?  Please use as the standard of
  comparison the ease _today_ of compromising or
  protecting these interests.  We are interested in
  scenarios in which these interests might be compromised
  or protected both individually and on a large scale.  Please
  be sure to tell us the interests you believe are at stake.

  Please send your comments on this question
  to CRYPTO@NAS.EDU.






Thread