[45124] in Cypherpunks
GAK Query
daemon@ATHENA.MIT.EDU (Anonymous)
Sun Dec 10 20:37:39 1995
Date: Mon, 11 Dec 1995 02:28:41 +0100
To: cypherpunks@toad.com
From: nobody@REPLAY.COM (Anonymous)
Steven Miller, in his "Civilizing Cyberspace," remarks in
his coverage of encryption issues that:
... the Administration is trying to split the [GAK]
opposition by working with private industry groups on
compromise escrow strategies that would let government
agents see the contents of decoded messages without
getting access to the escrowed key itself. [p. 306]
Does anyone know more about this tactic, whether it is
being pursued, or the legal and technical procedures for
decoding and seeing the messages?
As previously noted here:
Civilizing Cyberspace:
Policy, Power and the Information Highway
Steven E. Miller (CPSR Board)
Addison Wesley, 1996
ISBN 0-201-84760-4