From: Jeff Gostin <jgostin@eternal.pha.pa.us>
To: cypherpunks@toad.com
Message Hash: cedb0f079b90a484a380759466f9e88ae9324ea43378dcb93e20ed1d62bed7d4
Message ID: <940619205034a4rjgostin@eternal.pha.pa.us>
Reply To: N/A
UTC Datetime: 1994-06-21 13:49:46 UTC
Raw Date: Tue, 21 Jun 94 06:49:46 PDT
From: Jeff Gostin <jgostin@eternal.pha.pa.us>
Date: Tue, 21 Jun 94 06:49:46 PDT
To: cypherpunks@toad.com
Subject: (None)
Message-ID: <940619205034a4rjgostin@eternal.pha.pa.us>
MIME-Version: 1.0
Content-Type: text/plain
carterm@spartan.ac.brocku.ca (Mark Carter) writes:
> Encryption as a weapon is something that's not often talked about, despite
> the fact that everyone's always rambling about how valuable information
> is...
If you have backups and keep paper trails like any serious company,
this is merely inconvenient and annoying.
> The arguments for restraining encryption in corporate situations can
> go on and on... just as the arguments for encouraging private encryption
> can go on and on.
This argues similiarly to the gun control argument. Encryption, like
guns, are a tool. When used responsibly, tools don't cause problems. When
used irresponsibly, problems occur. Responsible use of encryption is for
privacy. Irresponsible use is for some damaging purpose.
--Jeff
--
====== ====== +----------------jgostin@eternal.pha.pa.us----------------+
== == | The new, improved, environmentally safe, bigger, better,|
== == -= | faster, hypo-allergenic, AND politically correct .sig. |
==== ====== | Now with a new fresh lemon scent! |
PGP Key Available +---------------------------------------------------------+
Return to June 1994
Return to “Jeff Gostin <jgostin@eternal.pha.pa.us>”
1994-06-21 (Tue, 21 Jun 94 06:49:46 PDT) - (None) - Jeff Gostin <jgostin@eternal.pha.pa.us>