1996-10-09 - Re: Microsoft CAPI

Header Data

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: m5@tivoli.com
Message Hash: d3d5778988559243c8015c0381e266344aa148a32ba25ff3289f4b652fd80774
Message ID: <9610092014.AA00842@ch1d157nwk>
Reply To: <2.2.32.19961009152246.006be444@netcom8.netcom.com>
UTC Datetime: 1996-10-09 20:14:20 UTC
Raw Date: Wed, 9 Oct 1996 13:14:20 -0700 (PDT)

Raw message

From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Wed, 9 Oct 1996 13:14:20 -0700 (PDT)
To: m5@tivoli.com
Subject: Re: Microsoft CAPI
In-Reply-To: <2.2.32.19961009152246.006be444@netcom8.netcom.com>
Message-ID: <9610092014.AA00842@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain


Mike McNally writes:
>  And so what happens when the Microsoft key is compromised?
>  It might be hard to break by purely cryptographic means, but
>  surely there are some people at Microsoft who aren't
>  millionaires.

I ask:  "Who Cares?"  It is easy enough to distribute with the secure-non-GAK  
plug-in a patch for disabling the module authentication.  Heck, you could  
even make an ActiveX applet that did it...


andrew
"Click Here to Download and Install Real Crypto"





Thread