From: Greg Broiles <gbroiles@netbox.com>
To: cypherpunks@cyberpass.net
Message Hash: 155e7f7e943af32a89810a815d63259574394534b071d3be1800de6763c5742c
Message ID: <3.0.2.32.19971018025454.03e23124@pop.sirius.com>
Reply To: <19971017183529.03942@rigel.infonex.com>
UTC Datetime: 1997-10-18 09:59:25 UTC
Raw Date: Sat, 18 Oct 1997 17:59:25 +0800
From: Greg Broiles <gbroiles@netbox.com>
Date: Sat, 18 Oct 1997 17:59:25 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Security flaws introduced by "other readers" in CMR
In-Reply-To: <19971017183529.03942@rigel.infonex.com>
Message-ID: <3.0.2.32.19971018025454.03e23124@pop.sirius.com>
MIME-Version: 1.0
Content-Type: text/plain
Adam Back writes:
>You have a dual concern: you are trying to protect against big brother
>and against little brother.
At the technical level, is there a meaningful difference between the
brothers? Aren't we really talking about third-party access to
communications, and second-party access to stored data ... with the
"brother" distinction being one made at a social/political level, as a
judgement about the legitimacy of the access or the size of the actor,
rather than the character of the access?
--
Greg Broiles | US crypto export control policy in a nutshell:
gbroiles@netbox.com | Export jobs, not crypto.
http://www.io.com/~gbroiles | http://www.parrhesia.com
Return to October 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”