1998-08-03 - Question….

Header Data

From: “Bernardo B. Terrado” <bbt@mudspring.uplb.edu.ph>
To: Anonymous <nobody@replay.com>
Message Hash: f852ebbbd5a13bf7748c66ea0fb21a871086e9da20aeb6d9f5b14b7e01a32527
Message ID: <Pine.GSO.3.96.980803162428.20611A-100000@mudspring.uplb.edu.ph>
Reply To: <199807310655.IAA08821@replay.com>
UTC Datetime: 1998-08-03 08:34:25 UTC
Raw Date: Mon, 3 Aug 1998 01:34:25 -0700 (PDT)

Raw message

From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Mon, 3 Aug 1998 01:34:25 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: Question....
In-Reply-To: <199807310655.IAA08821@replay.com>
Message-ID: <Pine.GSO.3.96.980803162428.20611A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain


How does a hardware encryption device work?


Does it need human intervention to convert a plaintext to ciphertext
or do we still give the instructions?

Correct me if I'm wrong, the key escrow is a hardware encryption device.


That's all for now, thanks.



Bernie





===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...you're forgiven not forgotten...."








Thread