1997-01-21 - Re: Newt’s phone calls

Header Data

From: Jeff Barber <jeffb@issl.atl.hp.com>
To: cypherpunks@toad.com (Cypherpunks List)
Message Hash: 29bf7da8a50af84374ce4da4a8e84f55c3ca5cfe4146c8f5a60f00f01df1a128
Message ID: <199701212019.PAA13783@jafar.issl.atl.hp.com>
Reply To: <01BC07A9.10CE1520@crecy.ai.mit.edu>
UTC Datetime: 1997-01-21 20:03:15 UTC
Raw Date: Tue, 21 Jan 1997 12:03:15 -0800 (PST)

Raw message

From: Jeff Barber <jeffb@issl.atl.hp.com>
Date: Tue, 21 Jan 1997 12:03:15 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks List)
Subject: Re: Newt's phone calls
In-Reply-To: <01BC07A9.10CE1520@crecy.ai.mit.edu>
Message-ID: <199701212019.PAA13783@jafar.issl.atl.hp.com>
MIME-Version: 1.0
Content-Type: text/plain

Phillip M. Hallam-Baker writes:

> >No, the real danger in weak crypto is that the poorly-informed will not
> >think about it *at all*.  If we had "poor crypto", Newt probably wouldn't
> >have been embarrassed by this sort of casual interception, and the issue
> >wouldn't have been raised in the public mind.  But our communications
> >still wouldn't be safe from more determined attackers.  Brouhahas like
> >these are good for the pro-(strong-)crypto agenda.
> Not the way we've being going on, Zero coverage of the
> crypto issue, zip, nada.

It was pointed out (in network newscasts, for example) that cellular
communications are completely unprotected and available for the taking
by anyone with a radio scanner.  I count this as good exposure even if
the alternatives weren't explicitly discussed.

-- Jeff