From: “James A. Donald” <jamesd@echeque.com>
To: Andrew Loewenstern <m5@tivoli.com
Message Hash: aa1544ecde9c56f53367ff0d3879c4b1c2f00c47c41dad1dbe027899d8515a62
Message ID: <199610110558.WAA24031@mail1.best.com>
Reply To: N/A
UTC Datetime: 1996-10-11 06:01:58 UTC
Raw Date: Thu, 10 Oct 1996 23:01:58 -0700 (PDT)
From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 10 Oct 1996 23:01:58 -0700 (PDT)
To: Andrew Loewenstern <m5@tivoli.com
Subject: Re: Microsoft CAPI
Message-ID: <199610110558.WAA24031@mail1.best.com>
MIME-Version: 1.0
Content-Type: text/plain
Mike McNally writes:
>> And so what happens when the Microsoft key is compromised?
>> It might be hard to break by purely cryptographic means, but
>> surely there are some people at Microsoft who aren't
>> millionaires.
At 03:13 PM 10/9/96 -0500, Andrew Loewenstern wrote:
> I ask: "Who Cares?" It is easy enough to distribute with the
secure-non-GAK
> plug-in a patch for disabling the module authentication. Heck, you could
> even make an ActiveX applet that did it.
Better than disabling, would be to give the user the choice of whose
signature to trust. Perhaps many users would prefer a crypto engine signed
by Zimmerman, rather than Microsoft.
---------------------------------------------------------------------
|
We have the right to defend ourselves | http://www.jim.com/jamesd/
and our property, because of the kind |
of animals that we are. True law | James A. Donald
derives from this right, not from the |
arbitrary power of the state. | jamesd@echeque.com
Return to October 1996
Return to “Mike McNally <m5@tivoli.com>”