1996-10-11 - Re: Microsoft CAPI

Header Data

From: “James A. Donald” <jamesd@echeque.com>
To: Andrew Loewenstern <m5@tivoli.com
Message Hash: aa1544ecde9c56f53367ff0d3879c4b1c2f00c47c41dad1dbe027899d8515a62
Message ID: <199610110558.WAA24031@mail1.best.com>
Reply To: N/A
UTC Datetime: 1996-10-11 06:01:58 UTC
Raw Date: Thu, 10 Oct 1996 23:01:58 -0700 (PDT)

Raw message

From: "James A. Donald" <jamesd@echeque.com>
Date: Thu, 10 Oct 1996 23:01:58 -0700 (PDT)
To: Andrew Loewenstern <m5@tivoli.com
Subject: Re: Microsoft CAPI
Message-ID: <199610110558.WAA24031@mail1.best.com>
MIME-Version: 1.0
Content-Type: text/plain


Mike McNally writes:
>>  And so what happens when the Microsoft key is compromised?
>>  It might be hard to break by purely cryptographic means, but
>>  surely there are some people at Microsoft who aren't
>>  millionaires.

At 03:13 PM 10/9/96 -0500, Andrew Loewenstern wrote:
> I ask:  "Who Cares?"  It is easy enough to distribute with the
secure-non-GAK  
> plug-in a patch for disabling the module authentication.  Heck, you could  
> even make an ActiveX applet that did it.


Better than disabling, would be to give the user the choice of whose
signature to trust.  Perhaps many users would prefer a crypto engine signed
by Zimmerman, rather than Microsoft.
 ---------------------------------------------------------------------
              				|  
We have the right to defend ourselves	|   http://www.jim.com/jamesd/
and our property, because of the kind	|  
of animals that we are. True law	|   James A. Donald
derives from this right, not from the	|  
arbitrary power of the state.		|   jamesd@echeque.com






Thread