From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 34e1a8f9e35c29956cda7f4d7e82f22b1ae1c319ffd73a4f9e3d27fa7f3ec019
Message ID: <9403101623.AA19072@ah.com>
Reply To: <199403100941.BAA17639@mail.netcom.com>
UTC Datetime: 1994-03-10 16:30:49 UTC
Raw Date: Thu, 10 Mar 94 08:30:49 PST
From: hughes@ah.com (Eric Hughes)
Date: Thu, 10 Mar 94 08:30:49 PST
To: cypherpunks@toad.com
Subject: The Coming Police State
In-Reply-To: <199403100941.BAA17639@mail.netcom.com>
Message-ID: <9403101623.AA19072@ah.com>
MIME-Version: 1.0
Content-Type: text/plain
>The obvious question: why would Joe User want storage space on someone
>else's system when he could encrypt on his own system?
Reliability in case of disk failure. Disk failure includes disk
seizure.
My private keys ought well to exist somewhere other than in their
usual place of residence and around that physical environs. Likewise,
they ought to be stored somewhere other than publically known storage
locations like safe deposit boxes.
And private keys are ony the first sort of sensitive data whose loss
has extremely large consequences.
And, as Tim points out, if the data site if offshore, so much the
better.
Eric
Return to March 1994
Return to “tcmay@netcom.com (Timothy C. May)”