1996-10-03 - Re: How to Compete under Clipper-3

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: John Gilmore <gnu@toad.com>
Message Hash: 2e47a779e2a4f83d4e4fd8add7593c8d5fc49d0440b8e581e1ddd65a23837c68
Message ID: <199610031925.PAA11450@jekyll.piermont.com>
Reply To: <199610031836.LAA22062@toad.com>
UTC Datetime: 1996-10-03 23:26:11 UTC
Raw Date: Fri, 4 Oct 1996 07:26:11 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Fri, 4 Oct 1996 07:26:11 +0800
To: John Gilmore <gnu@toad.com>
Subject: Re: How to Compete under Clipper-3
In-Reply-To: <199610031836.LAA22062@toad.com>
Message-ID: <199610031925.PAA11450@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



John Gilmore writes:
> The right competitive strategy is to build strong crypto using 168-bit
> Triple-DES, in a country that has a sane government and a respect for
> privacy.

You mean, like SSH's product?

For those that don't follow this, people who don't want to have their
communications listened in on are free to buy high quality
communications security products from SSH Communications Security, Ltd.
Their stuff is distributed internationally by Datafellows, and
includes 3DES, 128 bit IDEA, and plenty of other high quality crypto
products -- you configure it for the cipher of your choice. Key
management is handled with arbitrary key length RSA -- you, the user,
tune the length of the key, not the NSA.

The software is available free for noncommercial use and can be
downloaded on the net. Commercial users must pay a license fee.

This is only one such company. Most such companies are doing fine, and
aren't playing along with stupidity propagaged inside the beltway.

Perry





Thread