From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: m5@tivoli.com
Message Hash: d3d5778988559243c8015c0381e266344aa148a32ba25ff3289f4b652fd80774
Message ID: <9610092014.AA00842@ch1d157nwk>
Reply To: <2.2.32.19961009152246.006be444@netcom8.netcom.com>
UTC Datetime: 1996-10-09 20:14:20 UTC
Raw Date: Wed, 9 Oct 1996 13:14:20 -0700 (PDT)
From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Wed, 9 Oct 1996 13:14:20 -0700 (PDT)
To: m5@tivoli.com
Subject: Re: Microsoft CAPI
In-Reply-To: <2.2.32.19961009152246.006be444@netcom8.netcom.com>
Message-ID: <9610092014.AA00842@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain
Mike McNally writes:
> And so what happens when the Microsoft key is compromised?
> It might be hard to break by purely cryptographic means, but
> surely there are some people at Microsoft who aren't
> millionaires.
I ask: "Who Cares?" It is easy enough to distribute with the secure-non-GAK
plug-in a patch for disabling the module authentication. Heck, you could
even make an ActiveX applet that did it...
andrew
"Click Here to Download and Install Real Crypto"
Return to October 1996
Return to ““Timothy C. May” <tcmay@got.net>”