From: Jeff Barber <jeffb@issl.atl.hp.com>
To: cypherpunks@toad.com (Cypherpunks List)
Message Hash: 29bf7da8a50af84374ce4da4a8e84f55c3ca5cfe4146c8f5a60f00f01df1a128
Message ID: <199701212019.PAA13783@jafar.issl.atl.hp.com>
Reply To: <01BC07A9.10CE1520@crecy.ai.mit.edu>
UTC Datetime: 1997-01-21 20:03:15 UTC
Raw Date: Tue, 21 Jan 1997 12:03:15 -0800 (PST)
From: Jeff Barber <jeffb@issl.atl.hp.com>
Date: Tue, 21 Jan 1997 12:03:15 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks List)
Subject: Re: Newt's phone calls
In-Reply-To: <01BC07A9.10CE1520@crecy.ai.mit.edu>
Message-ID: <199701212019.PAA13783@jafar.issl.atl.hp.com>
MIME-Version: 1.0
Content-Type: text/plain
Phillip M. Hallam-Baker writes:
> >No, the real danger in weak crypto is that the poorly-informed will not
> >think about it *at all*. If we had "poor crypto", Newt probably wouldn't
> >have been embarrassed by this sort of casual interception, and the issue
> >wouldn't have been raised in the public mind. But our communications
> >still wouldn't be safe from more determined attackers. Brouhahas like
> >these are good for the pro-(strong-)crypto agenda.
>
> Not the way we've being going on, Zero coverage of the
> crypto issue, zip, nada.
It was pointed out (in network newscasts, for example) that cellular
communications are completely unprotected and available for the taking
by anyone with a radio scanner. I count this as good exposure even if
the alternatives weren't explicitly discussed.
-- Jeff
Return to January 1997
Return to ““Phillip M. Hallam-Baker” <hallam@ai.mit.edu>”