From: derek@cs.wisc.edu (Derek Zahn)
To: cypherpunks@toad.com
Message Hash: a98cc0cfc9a4a70bce4d5612955285b71d17c4038165f898e7f679d154d12592
Message ID: <9304162000.AA29054@lynx.cs.wisc.edu>
Reply To: N/A
UTC Datetime: 1993-04-16 20:00:08 UTC
Raw Date: Fri, 16 Apr 93 13:00:08 PDT
From: derek@cs.wisc.edu (Derek Zahn)
Date: Fri, 16 Apr 93 13:00:08 PDT
To: cypherpunks@toad.com
Subject: circling the wagons
Message-ID: <9304162000.AA29054@lynx.cs.wisc.edu>
MIME-Version: 1.0
Content-Type: text/plain
Assuming that the "Clipper chip" initiative isn't a teapot
tempest, I suppose we'd better start sharpening our rhetorical
knives.
Privacy arguments and sheer outrage will be useful, but it
seems to me that the "modern steganography" discussion from
a few weeks back offers an irrefutable argument:
By performing rather simple camouflaging, it is possible
to make an encrypted message undetectable by encoding
it in (images, voice, any other signal that could plausibly
contain noise). This is rather easy to do, so those who
REALLY want to hide what they're doing (terrorists, criminals,
republican campaign staff) will still be able to do so.
In fact, by encrypting the wrapper with your "Clipper"
system, they look like they're hiding noting. All that you
are buying is a false sense of security.
derek
Return to April 1993
Return to “derek@cs.wisc.edu (Derek Zahn)”
1993-04-16 (Fri, 16 Apr 93 13:00:08 PDT) - circling the wagons - derek@cs.wisc.edu (Derek Zahn)