From: Phil Karn <karn@qualcomm.com>
To: solman@MIT.EDU
Message Hash: f2bed02104440233e7f82f82f2d5420cf973da567c3ad81922e6655d419356f2
Message ID: <199407251802.LAA10432@servo.qualcomm.com>
Reply To: <9407230102.AA17231@ua.MIT.EDU>
UTC Datetime: 1994-07-26 02:47:50 UTC
Raw Date: Mon, 25 Jul 94 19:47:50 PDT
From: Phil Karn <karn@qualcomm.com>
Date: Mon, 25 Jul 94 19:47:50 PDT
To: solman@MIT.EDU
Subject: Re: Gore's "new and improved" key escrow proposal
In-Reply-To: <9407230102.AA17231@ua.MIT.EDU>
Message-ID: <199407251802.LAA10432@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain
I think we need to distinguish between encrypted *storage* and
encrypted *communications*. Voluntary key escrow may make sense for
encrypted stored business files, but communications is a different
story. Since there should be nobody out there recording packets, there
is no need to back up or escrow the keys used to encrypt them.
Phil
Return to July 1994
Return to “tcmay@netcom.com (Timothy C. May)”