1995-12-06 - GAK

Header Data

From: SBinkley@atitech.ca (Scott Binkley)
To: cypherpunks%toad.com@genie_1
Message Hash: 62b806c0f1b72202f28a8ce2310bd4cf1830df3ce2cb025dbf9e497af8bb484c
Message ID: <6615943A01502C79@-SMF->
Reply To: <6615943A02502C79@-SMF->
UTC Datetime: 1995-12-06 16:57:33 UTC
Raw Date: Wed, 6 Dec 95 08:57:33 PST

Raw message

From: SBinkley@atitech.ca (Scott Binkley)
Date: Wed, 6 Dec 95 08:57:33 PST
To: cypherpunks%toad.com@genie_1
Subject: GAK
In-Reply-To: <6615943A02502C79@-SMF->
Message-ID: <6615943A01502C79@-SMF->
MIME-Version: 1.0
Content-Type: text/plain


I heard a while back about being able to "split" up a PGP key.  What 
about
splitting up the key into many parts, and giving them out to multiple 
INDEPENDANT
agencies.  ie: One piece goes to the FBI, one to the NSA, one to some 
other committee, and
so on.  That way, no goverment body could just tap your conversations 
without getting
approval from others, and gaining the pieces of your key.

just a thought





Thread