From: Adamsc@io-online.com (Adamsc)
To: “Dale Thorn” <ericm@lne.com>
Message Hash: 0138f2a549780de9c9bf584aee5e7c06e0a4a706c2770ac880d456b6aad2d3a2
Message ID: <19961005064623375.AAA228@GIGANTE>
Reply To: N/A
UTC Datetime: 1996-10-05 08:51:19 UTC
Raw Date: Sat, 5 Oct 1996 16:51:19 +0800
From: Adamsc@io-online.com (Adamsc)
Date: Sat, 5 Oct 1996 16:51:19 +0800
To: "Dale Thorn" <ericm@lne.com>
Subject: Re: gack vs. key escrow vs. key recovery
Message-ID: <19961005064623375.AAA228@GIGANTE>
MIME-Version: 1.0
Content-Type: text/plain
On Thu, 03 Oct 1996 23:44:59 -0700, Dale Thorn wrote:
>Sounds to me like there's a need for a program that can produce secure
>encryption, yet the output looks like "real junk", i.e., not anything
>like what one of the *better* programs would produce. Then you can
>claim (with testimony of experts if necessary) that "I didn't encrypt
>it, must be just garbage". And even if you got some bozo govt. person
>testifying against you, you shouldn't have much problem making them look
>stupid and vindictive in front of a jury.
OTP anyone?
# Chris Adams <adamsc@io-online.com> | http://www.io-online.com/adamsc/adamsc.htp
# <cadams@acucobol.com> | send mail with subject "send PGPKEY"
"That's our advantage at Microsoft; we set the standards and we can change them."
--- Karen Hargrove, Microsoft (quoted in the Feb 1993 Unix Review editorial)
Return to October 1996
Return to “Adamsc@io-online.com (Adamsc)”
1996-10-05 (Sat, 5 Oct 1996 16:51:19 +0800) - Re: gack vs. key escrow vs. key recovery - Adamsc@io-online.com (Adamsc)