1998-10-08 - Crypto AG: The NSA’s Trojan Whore?

Header Data

From: Jukka E Isosaari <jei@zor.hut.fi>
To: cypherpunks@toad.com
Message Hash: a1543b42429aeefa746ededc66524e83b3d1525f2c8b694576d2b896999c61c4
Message ID: <Pine.LNX.3.96.981008153518.14319G-100000@zor.hut.fi>
Reply To: N/A
UTC Datetime: 1998-10-08 13:10:11 UTC
Raw Date: Thu, 8 Oct 1998 21:10:11 +0800

Raw message

From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Thu, 8 Oct 1998 21:10:11 +0800
To: cypherpunks@toad.com
Subject: Crypto AG: The NSA's Trojan Whore?
Message-ID: <Pine.LNX.3.96.981008153518.14319G-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain



http://caq.com/cryptogate

Are people familiar with this document?

Why shouldn't NSA have implanted this kind of back-doors
in various software and operating systems as well?

It seems to have worked so very well in the past.

++ J






Thread