1995-09-22 - Re: Council of Europe proposes to outlaw strong encryption (fwd)

Header Data

From: Duncan Frissell <frissell@panix.com>
To: wb8foz@netcom.com (David Lesher)
Message Hash: 5b39d26d4439e3838285f256ee347db6256f98961a7cf2ea93561eea61cb9dc6
Message ID: <199509221509.LAA09991@panix.com>
Reply To: N/A
UTC Datetime: 1995-09-22 15:09:16 UTC
Raw Date: Fri, 22 Sep 95 08:09:16 PDT

Raw message

From: Duncan Frissell <frissell@panix.com>
Date: Fri, 22 Sep 95 08:09:16 PDT
To: wb8foz@netcom.com (David Lesher)
Subject: Re: Council of Europe proposes to outlaw strong encryption (fwd)
Message-ID: <199509221509.LAA09991@panix.com>
MIME-Version: 1.0
Content-Type: text/plain


>The proposal would make telecoms operators responsible for decrypting         
>traffic and supplying it to governments when asked.  It would also             
>`change national laws to enable judicial authorities to chase hackers          
>across borders'.                                                               
>                                                                               
>However, `it remains possible that cryptography is available          
>to the public which cannot be deciphered,' his document says. `This            
>might lead to the conclusion to put restrictions on the possession,            
>distribution, or use of cryptography.'                
                         
This should prove about as effective as the current French or Russian bans.
What are they going to do when they figure out that there need no longer be
such a thing as a telecoms operator.  We do most of the message packaging
ourselves.  It will be a bit difficult for any connectivity supplier to tell
what's going out via one of our encrypted IP sessions.

Question for Perry -- I'm assuming that it will soon be possible to
originate encrypted TCP/IP sessions with a distant "process" somewhere.  Do
you see technical problems with a TCP/IP laundry being established
"somewhere" that strips trace info from one of my processes and prevents
back tracing beyond the mouth of this encrypted pipe?

Also Perry, what did you think of the article "How Anarchy Works" in the
latest Wired on the IETF?

DCF






Thread