[5901] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: IP: IETF considers building wiretapping into the Internet

daemon@ATHENA.MIT.EDU (Russell Nelson)
Wed Oct 13 16:57:41 1999

From: Russell Nelson <nelson@crynwr.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Wed, 13 Oct 1999 16:23:22 -0400 (EDT)
To: cryptography@c2.net
In-Reply-To: <19991013190858.0474A41F16@SIGABA.research.att.com>
Message-ID: <14340.59769.186135.503644@desk.crynwr.com>

Steven M. Bellovin writes:
 > So -- how should the back door be installed?  In the protocol? In the telco 
 > endpoint?  Is it ethical for security people to work on something that lowers 
 > the security of the system?  Given that it's going to be done anyway, is it 
 > ethical to refrain, lest it be done incompetently?

If something evil is done poorly, is that more or less evil?  Answer
not obvious to me.  In any case, a properly implemented end-to-end
encrypted voice stream traveling over a data path with the CALEA bit
set just allows the FBI easy access to strong crypto.

-- 
-russ nelson <nelson@crynwr.com>  http://russnelson.com
Crynwr sells support for free software  | PGPok | Government schools are so
521 Pleasant Valley Rd. | +1 315 268 1925 voice | bad that any rank amateur
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   | can outdo them. Homeschool!


home help back first fref pref prev next nref lref last post