From: SBinkley@atitech.ca (Scott Binkley)
To: cypherpunks%toad.com@genie_1
Message Hash: 62b806c0f1b72202f28a8ce2310bd4cf1830df3ce2cb025dbf9e497af8bb484c
Message ID: <6615943A01502C79@-SMF->
Reply To: <6615943A02502C79@-SMF->
UTC Datetime: 1995-12-06 16:57:33 UTC
Raw Date: Wed, 6 Dec 95 08:57:33 PST
From: SBinkley@atitech.ca (Scott Binkley)
Date: Wed, 6 Dec 95 08:57:33 PST
To: cypherpunks%toad.com@genie_1
Subject: GAK
In-Reply-To: <6615943A02502C79@-SMF->
Message-ID: <6615943A01502C79@-SMF->
MIME-Version: 1.0
Content-Type: text/plain
I heard a while back about being able to "split" up a PGP key. What
about
splitting up the key into many parts, and giving them out to multiple
INDEPENDANT
agencies. ie: One piece goes to the FBI, one to the NSA, one to some
other committee, and
so on. That way, no goverment body could just tap your conversations
without getting
approval from others, and gaining the pieces of your key.
just a thought
Return to December 1995
Return to “SBinkley@atitech.ca (Scott Binkley)”