[45124] in Cypherpunks

home help back first fref pref prev next nref lref last post

GAK Query

daemon@ATHENA.MIT.EDU (Anonymous)
Sun Dec 10 20:37:39 1995

Date: Mon, 11 Dec 1995 02:28:41 +0100
To: cypherpunks@toad.com
From: nobody@REPLAY.COM (Anonymous)


Steven Miller, in his "Civilizing Cyberspace," remarks in
his coverage of encryption issues that:

   ... the Administration is trying to split the [GAK]
   opposition by working with private industry groups on
   compromise escrow strategies that would let government
   agents see the contents of decoded messages without
   getting access to the escrowed key itself. [p. 306]

Does anyone know more about this tactic, whether it is
being pursued, or the legal and technical procedures for
decoding and seeing the messages?


As previously noted here:

Civilizing Cyberspace:
Policy, Power and the Information Highway
Steven E. Miller (CPSR Board)
Addison Wesley, 1996
ISBN 0-201-84760-4









home help back first fref pref prev next nref lref last post