1996-02-14 - Re: Stewart Baker’s web site & OECD international crypto policy

Header Data

From: jf_avon@citenet.net (Jean-Francois Avon (JFA Technologies, QC, Canada))
To: cypherpunks@toad.com
Message Hash: 19ecc54b1ba18137cd81ebef495a7487de059ba98abf5ca1cbdccd4ecdc5184c
Message ID: <9602140047.AB19351@cti02.citenet.net>
Reply To: N/A
UTC Datetime: 1996-02-14 00:51:26 UTC
Raw Date: Tue, 13 Feb 96 16:51:26 PST

Raw message

From: jf_avon@citenet.net (Jean-Francois Avon (JFA Technologies, QC, Canada))
Date: Tue, 13 Feb 96 16:51:26 PST
To: cypherpunks@toad.com
Subject: Re: Stewart Baker's web site & OECD international crypto policy
Message-ID: <9602140047.AB19351@cti02.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain


John Gilmore <gnu@toad.com> reported:


>My favorite was his summary report on the OECD meeting in December,
>~steptoe/286908.htm, at which the US tried to parade some of the
>fruits of its behind-the-scenes efforts to convince other governments
>to become as authoritarian as the US government on crypto policy.

Why help "potential enemies"?  Why a govt risks it's cherished 
'national security'?


>If the US government can quietly convince other countries to support
>Clipper-like systems (including "mandatory key escrow" and "trusted
     It probably means that they already cracked the code... :)

Definitely, they are insane beyond the safety level...

JFA
**** NEW PGP 2.6.2 KEY *********

2048 bits Key ID:24201BA1 1996/02/13 Jean-Francois Avon <jf_avon@citenet.net>
Key fingerprint =  23 B6 24 31 86 67 FB 35  C7 A7 AF 12 A1 61 E9 3D 


**** OLD KEY: DO NOT USE ANYMORE UNLESS FOR VERIFYING SIGNATURES ****

1024 bits Key ID:57214AED 1995/10/04 Jean-Francois Avon <jf_avon@citenet.net>
Key fingerprint =  84 96 76 AE EB 7C AB 15  88 47 87 B0 18 31 74 9F 






Thread