1997-07-04 - Crypto Risks and Rewards

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: d4307b46b1c0542f4f23ba466342884a2160be3b86c1783c91a36beea7283f87
Message ID: <1.5.4.32.19970704185701.006eac80@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-07-04 19:13:46 UTC
Raw Date: Sat, 5 Jul 1997 03:13:46 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Sat, 5 Jul 1997 03:13:46 +0800
To: cypherpunks@toad.com
Subject: Crypto Risks and Rewards
Message-ID: <1.5.4.32.19970704185701.006eac80@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



Senators Lott, Burns and Ashcroft discussed encryption
policy reform on June 27. The Deschall crack is cited as
a risk posed by Admin-McCain-Kerrey limitations. Ashcroft 
stated:

   I am privileged to serve on the Senate Judiciary Committee 
   where we will address this issue after the July recess. I 
   pledge to work with members on that Committee and with 
   other interested Senators and the leader to try to move a 
   bill in that committee that will capture the essence of Burns 
   substitute.

   No nationwide key recovery system, or a new licensing 
   requirement for certificate authorities should be brought 
   to the floor without thorough examination, analysis and 
   understanding. We must further study the impact of these 
   provisions well before this bill is brought to the Senate floor. 

For full report:

   http://jya.com/crypto-pr.txt  (14K)

----------

The Law Society of England and Wales has published a
response to the March DTI risky biz for Trusted Third Parties:

   http://jya.com/ttp-lawsoc.htm

----------

For the article Robert Hettinga cited by Thomas Vartanian
on the risks offering CA services:

   http://jya.com/ca-risks.htm

Recall that Mr. Vartanian provided the NSA paper, "How to 
Make a Mint, the Cryptography of Electronic Money:"

   http://jya.com/nsamint.htm






Thread