From: Hal <hfinney@shell.portal.com>
To: cypherpunks@toad.com
Message Hash: c7f2fe661d8e3270229312c9e05f5f3caa8c413892bd8311610de6dfb8c8a244
Message ID: <199402071710.JAA29030@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1994-02-07 17:10:36 UTC
Raw Date: Mon, 7 Feb 94 09:10:36 PST
From: Hal <hfinney@shell.portal.com>
Date: Mon, 7 Feb 94 09:10:36 PST
To: cypherpunks@toad.com
Subject: Re: A Nice Summary of Motives for Clipper
Message-ID: <199402071710.JAA29030@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
Several people on sci.crypt have pointed to the following paragraph
in Matt Blaze's report of the NSA briefing on Clipper, posted here and
in the newsgroups:
> Clipper chips should be available (to product vendors) in June. You
> can't just buy loose chips - they have to be installed in approved
> products. Your application interface has to be approved by NIST for
> you to get your hands on the chips.
This could explain a lot. In particular, if they can enforce this, it
could put an end to the dreams of multiple encryption. For months people
have been saying, "Clipper? No problem. I'll just encrypt with PGP then
pass it through Clipper and the Feds won't ever guess! Ha, ha, ha!"
Maybe this won't be so easy. From Blaze's description it sounds like
such devices wouldn't be approved. It could be the only Clipper phones
will be ones that don't do anything to keep the Feds from picking up the
conversation.
People could still build non-Clipper encrypting phones (assuming that
the constant rumors of threatening midnight visits from NSA agents are
false), but the users of those phones could no longer blend in with the
Clipper traffic.
Hal
Return to February 1994
Return to “tcmay@netcom.com (Timothy C. May)”