From: “Eric Verheul” <everheul@mail.rijnhaave.nl>
To: cypherpunks@toad.com
Message Hash: c674d8600b57cbbed5266fbf55b88d2233f92015d4cc20bc0c5ff135ca68148d
Message ID: <199701090741.IAA28828@mail.rijnhaave.nl>
Reply To: N/A
UTC Datetime: 1997-01-09 07:42:32 UTC
Raw Date: Wed, 8 Jan 1997 23:42:32 -0800 (PST)
From: "Eric Verheul" <everheul@mail.rijnhaave.nl>
Date: Wed, 8 Jan 1997 23:42:32 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: IBM Key Recovery Propaganda on United Airlines
Message-ID: <199701090741.IAA28828@mail.rijnhaave.nl>
MIME-Version: 1.0
Content-Type: text/plain
> To me, Key Recovery cryptography is like using a condom with a
> hole in it. No thanks.
Actually, on microscopical level *all* condoms have holes in them;
the holes are just small enough for you not to worry bout it. The same
applies to (good!) Key Recovery cryptography: there are holes but not
big enough for you to worry about!
>
> Toto
>
Eric
//My life-time-emailadress is Eric.Verheul@pobox.com
//Use this when emails start bouncing when I have
//switched to my next (inadequate) Internet-provider
Return to January 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”