1996-05-03 - KEY_lok

Header Data

From: jya@pipeline.com
To: cypherpunks@toad.com
Message Hash: 447ff4dad98ced8d1f05d7aaf69093d198ad01709f0a1391a859467bc4017058
Message ID: <199605021653.MAA12641@pipe4.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-05-03 01:58:10 UTC
Raw Date: Fri, 3 May 1996 09:58:10 +0800

Raw message

From: jya@pipeline.com
Date: Fri, 3 May 1996 09:58:10 +0800
To: cypherpunks@toad.com
Subject: KEY_lok
Message-ID: <199605021653.MAA12641@pipe4.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   5-2-96 FiTi reports at length on its investigation of a $19
   million fraud and conspiracy involving smart cards using
   the Fiat-Shamir algorithm for encrypting UK video.

   Most of the detailed, complicated report is about the
   financial and tax-evasive shenanigan's of firms jointly
   providing the cards to BSkyB sat-tv.

   Adi Shamir's work is featured but he does not appear to be
   at fault, although a central role was played by News Data
   Security Products (10% owned by Shamir). 

   The report does not get into the technology of crypto, but
   shows its keylock appeal for criminal conspiracies.

   KEY_lok











Thread