From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 217c47f754965a4cca27f9ac7c87bddebf6fd113ef1a2ffe3f293ceb444a3d57
Message ID: <199607021322.NAA17823@pipe4.t2.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-07-02 17:06:24 UTC
Raw Date: Wed, 3 Jul 1996 01:06:24 +0800
From: jya@pipeline.com (John Young)
Date: Wed, 3 Jul 1996 01:06:24 +0800
To: cypherpunks@toad.com
Subject: LOS_tit
Message-ID: <199607021322.NAA17823@pipe4.t2.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
7-2-96 UST, page one:
"Companies fear losing privacy, customers' trust."
In a show of self-reliance reminiscent of the old West,
companies are taking matters into their own hands,
hiring security firms to protect their computer systems
and ignoring the convention that law enforcement is the
best defense. It's a stance that has implications for
law enforcement and commerce, raises broad questions of
privacy and control, and pits the philosophy of the
Clinton administration directly against that of many
Fortune 500 companies. "An organization has very little
to gain" by reporting, says Lloyd Hession, of IBM's
Business Recovery Services.
There seems to be universal agreement that the strongest
means for securing computer data against theft lies in
cryptography, but the Clinton administration, citing
fears that criminals would use cryptography to cloak
their activities, is setting regulations slowing
development of cryptography software.
The Clinton administration is to announce, as early as
this week, a commission to determine the federal
government's role in securing cyberspace, from terrorism
to petty crimes.
http://pwp.usa.pipeline.com/~jya/lostit.txt (13 kb)
Go via www.anonymizer.com. Pipeline now belongs to
Mindspring, an Atlanta company.
LOS_tit
Return to July 1996
Return to “jya@pipeline.com (John Young)”
1996-07-02 (Wed, 3 Jul 1996 01:06:24 +0800) - LOS_tit - jya@pipeline.com (John Young)