From: “William H. Geiger III” <whgiii@amaranth.com>
To: John Young <jya@pipeline.com>
Message Hash: 5a7d5bbcab7237ef993d03d1e72e0f3d2ecd78a572a028c73a3c127748841add
Message ID: <199709071220.IAA01391@users.invweb.net>
Reply To: <1.5.4.32.19970906234350.00705f64@pop.pipeline.com>
UTC Datetime: 1997-09-07 12:40:00 UTC
Raw Date: Sun, 7 Sep 1997 20:40:00 +0800
From: "William H. Geiger III" <whgiii@amaranth.com>
Date: Sun, 7 Sep 1997 20:40:00 +0800
To: John Young <jya@pipeline.com>
Subject: Re: BXA Testimony at SAFE Hearing
In-Reply-To: <1.5.4.32.19970906234350.00705f64@pop.pipeline.com>
Message-ID: <199709071220.IAA01391@users.invweb.net>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
In <1.5.4.32.19970906234350.00705f64@pop.pipeline.com>, on 09/06/97
at 07:43 PM, John Young <jya@pipeline.com> said:
>See William Reinsch's testimony on the administration's
>encryption policy at the September 4 SAFE hearing:
> http://jya.com/bxa090497.htm
>Perhaps dissimulating, or not then clued to the draft GAK bill, Reinsch
>states:
>1. Foreign crypto products are not as widely available as export control
>critics claim, and thus do not threaten US products.
Lie
>2. The administration is against mandatory key escrow.
Lie
>3. Finds the SAFE bill unhelpful but likes its crypto-criminalization
>provision and favors McCain-Kerrey's Secure Public Network Act bill or
>other legislation that will:
> Expressly confirm the freedom of domestic users to choose
> any type or strength of encryption.
Lie
> Explicitly state that participation in a key management
> infrastructure is voluntary .
Lie
> Set forth legal conditions for the release of recovery
> information to law enforcement officials pursuant to lawful
> authority and provide liability protection for key recovery
> agents who have properly released such information.
Any time they want it.
> Criminalize the misuse of keys and the use of encryption to
> further a crime.
Any and all uses will be a crime.
> Offer, on a voluntary basis, firms that are in the business of
> providing public cryptography keys the opportunity to obtain
> government recognition, allowing them to market the
> trustworthiness implied by government approval.
They don't want it nor do they need it.
- --
- ---------------------------------------------------------------
William H. Geiger III http://www.amaranth.com/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNBKFoY9Co1n+aLhhAQH0OgQAxkQp423VxnMp9N9MtUYdj5iyFrreJCB6
O4t86fHIU74mpVs1KyBicWBw2k7CZrLXnc9LaTUXU4l1WXbGeahCVsFoh+FkbtVJ
gZnY3eygHYDvQePPgu+QEafwjfCbxixb60nYYMBR6MpTTlDZAJWwxnGDU+e8b6o2
mmmjulN/KS8=
=4SO4
-----END PGP SIGNATURE-----
Return to September 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”