1994-06-21 - (None)

Header Data

From: Jeff Gostin <jgostin@eternal.pha.pa.us>
To: cypherpunks@toad.com
Message Hash: cedb0f079b90a484a380759466f9e88ae9324ea43378dcb93e20ed1d62bed7d4
Message ID: <940619205034a4rjgostin@eternal.pha.pa.us>
Reply To: N/A
UTC Datetime: 1994-06-21 13:49:46 UTC
Raw Date: Tue, 21 Jun 94 06:49:46 PDT

Raw message

From: Jeff Gostin <jgostin@eternal.pha.pa.us>
Date: Tue, 21 Jun 94 06:49:46 PDT
To: cypherpunks@toad.com
Subject: (None)
Message-ID: <940619205034a4rjgostin@eternal.pha.pa.us>
MIME-Version: 1.0
Content-Type: text/plain


carterm@spartan.ac.brocku.ca (Mark Carter) writes:

> Encryption as a weapon is something that's not often talked about, despite
> the fact that everyone's always rambling about how valuable information
> is...
     If you have backups and keep paper trails like any serious company,
this is merely inconvenient and annoying.

> The arguments for restraining encryption in corporate situations can
> go on and on... just as the arguments for encouraging private encryption
> can go on and on.
     This argues similiarly to the gun control argument. Encryption, like
guns, are a tool. When used responsibly, tools don't cause problems. When
used irresponsibly, problems occur. Responsible use of encryption is for
privacy. Irresponsible use is for some damaging purpose.


                                        --Jeff
--
======  ======    +----------------jgostin@eternal.pha.pa.us----------------+
  ==    ==        | The new, improved, environmentally safe, bigger, better,|
  ==    ==  -=    | faster, hypo-allergenic, AND politically correct .sig.  |
====    ======    | Now with a new fresh lemon scent!                       |
PGP Key Available +---------------------------------------------------------+ 





Thread