From: Dale Thorn <dthorn@gte.net>
To: Eric Verheul <everheul@mail.rijnhaave.nl>
Message Hash: 3c674a1432599fefb01ebb80e13546af73e458eed77fe8ccdaf962e7b79f4f9d
Message ID: <32D50F11.77D1@gte.net>
Reply To: <199701090741.IAA28828@mail.rijnhaave.nl>
UTC Datetime: 1997-01-09 15:38:29 UTC
Raw Date: Thu, 9 Jan 1997 07:38:29 -0800 (PST)
From: Dale Thorn <dthorn@gte.net>
Date: Thu, 9 Jan 1997 07:38:29 -0800 (PST)
To: Eric Verheul <everheul@mail.rijnhaave.nl>
Subject: Re: IBM Key Recovery Propaganda on United Airlines
In-Reply-To: <199701090741.IAA28828@mail.rijnhaave.nl>
Message-ID: <32D50F11.77D1@gte.net>
MIME-Version: 1.0
Content-Type: text/plain
Eric Verheul wrote:
> > To me, Key Recovery cryptography is like using a condom with a
> > hole in it. No thanks.
> Actually, on microscopical level *all* condoms have holes in them;
> the holes are just small enough for you not to worry bout it. The same
> applies to (good!) Key Recovery cryptography: there are holes but not
> big enough for you to worry about!
Not worry? Really? What about those pesky little virii that are
*much* smaller than the holes in the condoms?
Return to January 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”