1995-12-11 - GAK Query

Header Data

From: nobody@REPLAY.COM (Anonymous)
To: cypherpunks@toad.com
Message Hash: 35696d29d1016af6dc667f2c42d326bd47e41918b060a97f49a885eb2ce7c2d4
Message ID: <199512110128.CAA13387@utopia.hacktic.nl>
Reply To: N/A
UTC Datetime: 1995-12-11 01:30:13 UTC
Raw Date: Sun, 10 Dec 95 17:30:13 PST

Raw message

From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 10 Dec 95 17:30:13 PST
To: cypherpunks@toad.com
Subject: GAK Query
Message-ID: <199512110128.CAA13387@utopia.hacktic.nl>
MIME-Version: 1.0
Content-Type: text/plain



Steven Miller, in his "Civilizing Cyberspace," remarks in
his coverage of encryption issues that:

   ... the Administration is trying to split the [GAK]
   opposition by working with private industry groups on
   compromise escrow strategies that would let government
   agents see the contents of decoded messages without
   getting access to the escrowed key itself. [p. 306]

Does anyone know more about this tactic, whether it is
being pursued, or the legal and technical procedures for
decoding and seeing the messages?


As previously noted here:

Civilizing Cyberspace:
Policy, Power and the Information Highway
Steven E. Miller (CPSR Board)
Addison Wesley, 1996
ISBN 0-201-84760-4













Thread