From: nobody@REPLAY.COM (Anonymous)
To: cypherpunks@toad.com
Message Hash: 35696d29d1016af6dc667f2c42d326bd47e41918b060a97f49a885eb2ce7c2d4
Message ID: <199512110128.CAA13387@utopia.hacktic.nl>
Reply To: N/A
UTC Datetime: 1995-12-11 01:30:13 UTC
Raw Date: Sun, 10 Dec 95 17:30:13 PST
From: nobody@REPLAY.COM (Anonymous)
Date: Sun, 10 Dec 95 17:30:13 PST
To: cypherpunks@toad.com
Subject: GAK Query
Message-ID: <199512110128.CAA13387@utopia.hacktic.nl>
MIME-Version: 1.0
Content-Type: text/plain
Steven Miller, in his "Civilizing Cyberspace," remarks in
his coverage of encryption issues that:
... the Administration is trying to split the [GAK]
opposition by working with private industry groups on
compromise escrow strategies that would let government
agents see the contents of decoded messages without
getting access to the escrowed key itself. [p. 306]
Does anyone know more about this tactic, whether it is
being pursued, or the legal and technical procedures for
decoding and seeing the messages?
As previously noted here:
Civilizing Cyberspace:
Policy, Power and the Information Highway
Steven E. Miller (CPSR Board)
Addison Wesley, 1996
ISBN 0-201-84760-4
Return to December 1995
Return to “nobody@REPLAY.COM (Anonymous)”
1995-12-11 (Sun, 10 Dec 95 17:30:13 PST) - GAK Query - nobody@REPLAY.COM (Anonymous)