1994-07-22 - Re: Gore’s “new and improved” key escrow proposal

Header Data

From: ebrandt@muddcs.cs.hmc.edu (Eli Brandt)
To: cypherpunks@toad.com (cypherpunks list)
Message Hash: 4fa12f560782d9642effb06de0566bd591ecc507c1690fe1f733cd1722233957
Message ID: <9407220946.AA12779@muddcs.cs.hmc.edu>
Reply To: <199407220716.AAA23701@netcom8.netcom.com>
UTC Datetime: 1994-07-22 10:32:45 UTC
Raw Date: Fri, 22 Jul 94 03:32:45 PDT

Raw message

From: ebrandt@muddcs.cs.hmc.edu (Eli Brandt)
Date: Fri, 22 Jul 94 03:32:45 PDT
To: cypherpunks@toad.com (cypherpunks list)
Subject: Re: Gore's "new and improved" key escrow proposal
In-Reply-To: <199407220716.AAA23701@netcom8.netcom.com>
Message-ID: <9407220946.AA12779@muddcs.cs.hmc.edu>
MIME-Version: 1.0
Content-Type: text


Tim May said:
> Others here will have a clearer idea than I have, but I don't think a
> "software standard" is what is now being planned. Software-only
> solution cannot possibly have the security that's needed [...]

My reading of the BSA blurb was that software key escrow really is
being planned: "software implementable [and] based on a non-classified
encryption formula".  Yes, this sounds pretty silly.  I don't see how
you could possibly prevent a rogue phone from interoperating with a
fascistic one.  Guess I need to snarf the original document.

   Eli   ebrandt@hmc.edu




Thread