From: johnsonr@hoshi.colorado.edu (Richard Johnson)
To: cypherpunks@toad.com
Message Hash: 7e35689421c296cdb9faace8694b2b295e354794d85156ef28fb424382b6c438
Message ID: <v02140b00ad463de68e4c@[204.144.184.50]>
Reply To: N/A
UTC Datetime: 1996-02-13 14:11:29 UTC
Raw Date: Tue, 13 Feb 1996 22:11:29 +0800
From: johnsonr@hoshi.colorado.edu (Richard Johnson)
Date: Tue, 13 Feb 1996 22:11:29 +0800
To: cypherpunks@toad.com
Subject: Pointer to pro-"compromise" analysis of Japanese Crypto Policy
Message-ID: <v02140b00ad463de68e4c@[204.144.184.50]>
MIME-Version: 1.0
Content-Type: text/plain
Japanese encryption policy evidently has no room yet for key "compromise"
by the Japanese government. However, Mr. Baker holds out hope that that
may change.
Forwarded-by: bostic@bsdi.com (Keith Bostic)
Forwarded-by: Phil Agre <pagre@weber.ucsd.edu>
EMERGING JAPANESE ENCRYPTION POLICY
by Stewart A. Baker
Steptoe & Johnson
sbaker@steptoe.com
http://www.us.net/~steptoe/276915.htm
Return to February 1996
Return to “johnsonr@hoshi.colorado.edu (Richard Johnson)”
1996-02-13 (Tue, 13 Feb 1996 22:11:29 +0800) - Pointer to pro-“compromise” analysis of Japanese Crypto Policy - johnsonr@hoshi.colorado.edu (Richard Johnson)