From: Carl Ellison <cme@TIS.COM>
To: bal@martigny.ai.mit.edu
Message Hash: 86749d196f013199d55d5923d2ef59444303dc9ea221fbb586821c2d11702bd6
Message ID: <9507151728.AA15916@tis.com>
Reply To: N/A
UTC Datetime: 1995-07-15 17:30:43 UTC
Raw Date: Sat, 15 Jul 95 10:30:43 PDT
From: Carl Ellison <cme@TIS.COM>
Date: Sat, 15 Jul 95 10:30:43 PDT
To: bal@martigny.ai.mit.edu
Subject: Re: Anti-Electronic Racketeering Act of 1995 (fwd)
Message-ID: <9507151728.AA15916@tis.com>
MIME-Version: 1.0
Content-Type: text/plain
>Date: Fri, 14 Jul 95 21:28:27 -0400
>From: "Brian A. LaMacchia" <bal@martigny.ai.mit.edu>
>Subject: Re: Anti-Electronic Racketeering Act of 1995 (fwd)
>
> > `(c) It shall be an affirmative defense to prosecution under this
> > section that the software at issue used a universal decoding device
> > or program that was provided to the Department of Justice prior to
> > the distribution.'.
>
> This isn't escrowed encryption being allowed here. This is straight giving
> of keys (or a back door) to the gov't. Even Clipper fails this test.
>
>Why doesn't GAK satisfy this clause?
[...]
>
>I don't see how Clipper fails the 1030A(c) test, except possibly for the
>fact that the proposed escrow agents were not both within DOJ. I think
>that's a minor point.
Sorry. That's the minor point I was talking about.
For example, one might make an exportable system by doing something really
nice for the gov't and giving NSA a back door master key for it to use.
That doesn't give it to the DoJ -- and I'm not so sure NSA would admit to
the existence of a back door much less release the master key.
- Carl
Return to July 1995
Return to “Carl Ellison <cme@TIS.COM>”
1995-07-15 (Sat, 15 Jul 95 10:30:43 PDT) - Re: Anti-Electronic Racketeering Act of 1995 (fwd) - Carl Ellison <cme@TIS.COM>