From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: d4307b46b1c0542f4f23ba466342884a2160be3b86c1783c91a36beea7283f87
Message ID: <1.5.4.32.19970704185701.006eac80@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-07-04 19:13:46 UTC
Raw Date: Sat, 5 Jul 1997 03:13:46 +0800
From: John Young <jya@pipeline.com>
Date: Sat, 5 Jul 1997 03:13:46 +0800
To: cypherpunks@toad.com
Subject: Crypto Risks and Rewards
Message-ID: <1.5.4.32.19970704185701.006eac80@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Senators Lott, Burns and Ashcroft discussed encryption
policy reform on June 27. The Deschall crack is cited as
a risk posed by Admin-McCain-Kerrey limitations. Ashcroft
stated:
I am privileged to serve on the Senate Judiciary Committee
where we will address this issue after the July recess. I
pledge to work with members on that Committee and with
other interested Senators and the leader to try to move a
bill in that committee that will capture the essence of Burns
substitute.
No nationwide key recovery system, or a new licensing
requirement for certificate authorities should be brought
to the floor without thorough examination, analysis and
understanding. We must further study the impact of these
provisions well before this bill is brought to the Senate floor.
For full report:
http://jya.com/crypto-pr.txt (14K)
----------
The Law Society of England and Wales has published a
response to the March DTI risky biz for Trusted Third Parties:
http://jya.com/ttp-lawsoc.htm
----------
For the article Robert Hettinga cited by Thomas Vartanian
on the risks offering CA services:
http://jya.com/ca-risks.htm
Recall that Mr. Vartanian provided the NSA paper, "How to
Make a Mint, the Cryptography of Electronic Money:"
http://jya.com/nsamint.htm
Return to July 1997
Return to “John Young <jya@pipeline.com>”
1997-07-04 (Sat, 5 Jul 1997 03:13:46 +0800) - Crypto Risks and Rewards - John Young <jya@pipeline.com>