1996-10-04 - Re: How might new GAK be enforced?

Header Data

From: Adamsc@io-online.com (Adamsc)
To: “tcmay@got.net>
Message Hash: 6888c4df5442aa8fd2fa14aaf31cfb1029213e38ea3e1256a8fab6eba207f79b
Message ID: <19961004020539265.AAH223@GIGANTE>
Reply To: N/A
UTC Datetime: 1996-10-04 12:35:31 UTC
Raw Date: Fri, 4 Oct 1996 20:35:31 +0800

Raw message

From: Adamsc@io-online.com (Adamsc)
Date: Fri, 4 Oct 1996 20:35:31 +0800
To: "tcmay@got.net>
Subject: Re: How might new GAK be enforced?
Message-ID: <19961004020539265.AAH223@GIGANTE>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 1 Oct 1996 20:55:40 -0800, Timothy C. May wrote:

>And just what would you call PGP?

>Long before the MIT deal, people in the U.S. were using their "OK in
>America" (not counting RSADSI's issues) software to communicate with
>"illegally exported" copies in foreign lands.

Just informally, how many of the people on this list do you think have
bypassed any cooperation with the USG on general principles and are using
International PGP?   ("Well this one uses non-banned math")


Unfortunately, we've already demonstrated that hackers (real ones) and/or
cpunks will use Underground Crypto.  What's missing is evidence that business
(and thus Joe Sixpack - either directly or indirectly) will.

#  Chris Adams <adamsc@io-online.com>   | http://www.io-online.com/adamsc/adamsc.htp
#  <cadams@acucobol.com>		 | send mail with subject "send PGPKEY"
"That's our advantage at Microsoft; we set the standards and we can change them."
   --- Karen Hargrove, Microsoft (quoted in the Feb 1993 Unix Review editorial)







Thread