1996-03-13 - Re: Why escrow? (was Re: How would Leahy bill affect crypto over HAM

Header Data

From: jim bell <jimbell@pacifier.com>
To: “Deranged Mutant” <WlkngOwl@UNiX.asb.com>
Message Hash: de6d6f487070fbd71428ae5704ab524fe81e6d5209880ef325826a7b1fa40c8c
Message ID: <m0twuXn-00092BC@pacifier.com>
Reply To: N/A
UTC Datetime: 1996-03-13 23:17:03 UTC
Raw Date: Thu, 14 Mar 1996 07:17:03 +0800

Raw message

From: jim bell <jimbell@pacifier.com>
Date: Thu, 14 Mar 1996 07:17:03 +0800
To: "Deranged Mutant" <WlkngOwl@UNiX.asb.com>
Subject: Re: Why escrow? (was Re: How would Leahy bill affect crypto over HAM
Message-ID: <m0twuXn-00092BC@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


At 01:39 AM 3/13/96 +0000, Deranged Mutant wrote:

>They may use secret sharing or splitting methods and handle parts by 
>different organizations within themselves and hand other parts to an 
>outside agent.  Sometimes this makes sense when there are political 
>rivalries within an organization.  They want the ability to get into 
>Dilbert's files if he drops dead, but they want an objective party to 
>hold part of the key so his rivals don't try to steal his files.

Notice, however, how the government seems to be assuming that "key escrow" 
(to the extent that it is implemented at all!) gets implemented in a way 
which is "friendly" to government agents.  They assume that there is one key 
that is available at one location, one that is well-marked and identified, 
unencrypted, and is available for pickup 24 hours per day assuming they 
present the proper credentials or court order.

Even the most limited planning could easily develop a system that achieves 
all the benefits of escrow for the user, but is essentially impossible for 
government agents (or for that matter, anyone else!) to use to the detriment 
of the user.  






Thread