[756] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: key recovery vs data backup

daemon@ATHENA.MIT.EDU (Lucky Green)
Thu May 8 12:55:32 1997

Date: Wed, 07 May 1997 21:56:21 -0700
To: Carl Ellison <cme@cybercash.com>
From: Lucky Green <shamrock@netcom.com>
Cc: cryptography@c2.net

At 11:47 PM 5/7/97 -0400, Carl Ellison wrote:
>I was saying that if Sam needs to read my encrypted file/mail, then I should 
>list Sam as a crypto-recipient.  If Acme,Inc. needs to read my encrypted 
>file/mail, then I should list Acme,Inc. as a crypto-recipient.
>
>There's no safe of keys.  It's even simpler to explain to an executive.

Several people on this list asked me to elaborate on my claim that KR is
not required. I doubt that I could put it more succinctly than Carl has in
his post.



-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred

   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi

home help back first fref pref prev next nref lref last post