From: smb@research.att.com
To: Mike Godwin <mnemonic@eff.org>
Message Hash: a980c16ed8187a3206431db665e651307050dc0aaf19818d299386986149a4f1
Message ID: <9402151958.AA17853@toad.com>
Reply To: N/A
UTC Datetime: 1994-02-15 20:09:06 UTC
Raw Date: Tue, 15 Feb 94 12:09:06 PST
From: smb@research.att.com
Date: Tue, 15 Feb 94 12:09:06 PST
To: Mike Godwin <mnemonic@eff.org>
Subject: Re: LEAF, SS7
Message-ID: <9402151958.AA17853@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
> But the LEAF itself is encrypted, including the session key, so
> enemies can't do traffic analysis based on the LEAF.
But the police can. They can decrypt the LEAF even without an escrow
key. You use a family key to do that.
Precisely my point.
Return to February 1994
Return to “smb@research.att.com”
1994-02-15 (Tue, 15 Feb 94 12:09:06 PST) - Re: LEAF, SS7 - smb@research.att.com