From: “CRYPTO” <crypto@nas.edu>
To: alt-privacy@cs.utexas.edu
Message Hash: 3e13db0879651a52665f2ba56697eea9459b86aa5eb604b0ce9acab2a2d67a39
Message ID: <9411097869.AA786998597@nas.edu>
Reply To: N/A
UTC Datetime: 1994-12-09 15:46:37 UTC
Raw Date: Fri, 9 Dec 94 07:46:37 PST
From: "CRYPTO" <crypto@nas.edu>
Date: Fri, 9 Dec 94 07:46:37 PST
To: alt-privacy@cs.utexas.edu
Subject: Question #1 to the community regarding National...
Message-ID: <9411097869.AA786998597@nas.edu>
MIME-Version: 1.0
Content-Type: text/plain
Subject:
Question #1 to the community regarding National Cryptography Policy
As many of you know, the National Research Council is
undertaking a study of national cryptography policy
(description available on request to CRYPTO@NAS.EDU).
This note is the first of a number of questions that will
be posted to the Internet community in our attempt to solicit
input on a broad scale. Please circulate this request to anyone
that you think might be able to contribute.
The question of this posting is the following:
How, if at all, do capabilities enabled by new and emerging
technology in telecommunications (e.g., key-escrow
encryption technologies, digital telephony) and electronic
networking make it _easier_ for those who control that
technology to compromise and/or protect the interests of
individual end users? Please use as the standard of
comparison the ease _today_ of compromising or
protecting these interests. We are interested in
scenarios in which these interests might be compromised
or protected both individually and on a large scale. Please
be sure to tell us the interests you believe are at stake.
Please send your comments on this question
to CRYPTO@NAS.EDU.
Return to December 1994
Return to ““CRYPTO” <crypto@nas.edu>”
1994-12-09 (Fri, 9 Dec 94 07:46:37 PST) - Question #1 to the community regarding National… - “CRYPTO” <crypto@nas.edu>