From: ebrandt@muddcs.cs.hmc.edu (Eli Brandt)
To: cypherpunks@toad.com (cypherpunks list)
Message Hash: 4fa12f560782d9642effb06de0566bd591ecc507c1690fe1f733cd1722233957
Message ID: <9407220946.AA12779@muddcs.cs.hmc.edu>
Reply To: <199407220716.AAA23701@netcom8.netcom.com>
UTC Datetime: 1994-07-22 10:32:45 UTC
Raw Date: Fri, 22 Jul 94 03:32:45 PDT
From: ebrandt@muddcs.cs.hmc.edu (Eli Brandt)
Date: Fri, 22 Jul 94 03:32:45 PDT
To: cypherpunks@toad.com (cypherpunks list)
Subject: Re: Gore's "new and improved" key escrow proposal
In-Reply-To: <199407220716.AAA23701@netcom8.netcom.com>
Message-ID: <9407220946.AA12779@muddcs.cs.hmc.edu>
MIME-Version: 1.0
Content-Type: text
Tim May said:
> Others here will have a clearer idea than I have, but I don't think a
> "software standard" is what is now being planned. Software-only
> solution cannot possibly have the security that's needed [...]
My reading of the BSA blurb was that software key escrow really is
being planned: "software implementable [and] based on a non-classified
encryption formula". Yes, this sounds pretty silly. I don't see how
you could possibly prevent a rogue phone from interoperating with a
fascistic one. Guess I need to snarf the original document.
Eli ebrandt@hmc.edu
Return to July 1994
Return to “tcmay@netcom.com (Timothy C. May)”