From: Jukka E Isosaari <jei@zor.hut.fi>
To: cypherpunks@toad.com
Message Hash: a1543b42429aeefa746ededc66524e83b3d1525f2c8b694576d2b896999c61c4
Message ID: <Pine.LNX.3.96.981008153518.14319G-100000@zor.hut.fi>
Reply To: N/A
UTC Datetime: 1998-10-08 13:10:11 UTC
Raw Date: Thu, 8 Oct 1998 21:10:11 +0800
From: Jukka E Isosaari <jei@zor.hut.fi>
Date: Thu, 8 Oct 1998 21:10:11 +0800
To: cypherpunks@toad.com
Subject: Crypto AG: The NSA's Trojan Whore?
Message-ID: <Pine.LNX.3.96.981008153518.14319G-100000@zor.hut.fi>
MIME-Version: 1.0
Content-Type: text/plain
http://caq.com/cryptogate
Are people familiar with this document?
Why shouldn't NSA have implanted this kind of back-doors
in various software and operating systems as well?
It seems to have worked so very well in the past.
++ J
Return to October 1998
Return to “Jukka E Isosaari <jei@zor.hut.fi>”
1998-10-08 (Thu, 8 Oct 1998 21:10:11 +0800) - Crypto AG: The NSA’s Trojan Whore? - Jukka E Isosaari <jei@zor.hut.fi>