[67372] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: gack vs. key escrow vs. key recovery

daemon@ATHENA.MIT.EDU (Adamsc)
Sat Oct 5 03:09:11 1996

From: Adamsc@io-online.com (Adamsc)
To: "Dale Thorn" <dthorn@gte.net>, "Eric Murray" <ericm@lne.com>
Cc: "cypherpunks@toad.com" <cypherpunks@toad.com>
Date: Fri, 04 Oct 96 23:47:38 -0700
Reply-To: "Chris Adams" <adamsc@io-online.com>

On Thu, 03 Oct 1996 23:44:59 -0700, Dale Thorn wrote:

>Sounds to me like there's a need for a program that can produce secure 
>encryption, yet the output looks like "real junk", i.e., not anything 
>like what one of the *better* programs would produce.  Then you can 
>claim (with testimony of experts if necessary) that "I didn't encrypt 
>it, must be just garbage".  And even if you got some bozo govt. person 
>testifying against you, you shouldn't have much problem making them look 
>stupid and vindictive in front of a jury.


OTP anyone?


#  Chris Adams <adamsc@io-online.com>   | http://www.io-online.com/adamsc/adamsc.htp
#  <cadams@acucobol.com>		 | send mail with subject "send PGPKEY"
"That's our advantage at Microsoft; we set the standards and we can change them."
   --- Karen Hargrove, Microsoft (quoted in the Feb 1993 Unix Review editorial)



home help back first fref pref prev next nref lref last post