[10183] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Horseman Number 3: Osama Used 40 bits

daemon@ATHENA.MIT.EDU (Adam Fields)
Thu Jan 17 17:00:40 2002

Message-Id: <200201172147.g0HLlCK18092@sparkle.generation.net>
To: Nelson Minar <nelson@monkey.org>
Cc: "R. A. Hettinga" <rahettinga@earthlink.net>,
	cryptography@wasabisystems.com
From: Adam Fields <fields@surgam.net>
In-reply-to: Your message of "Thu, 17 Jan 2002 13:04:31 PST."
             <15431.15455.681196.973414@cabernet.nelson.monkey.org> 
Date: Thu, 17 Jan 2002 16:47:12 -0500


Nelson Minar says:
> If this report is true, then it's evidence that the previous US crypto
> export policy works. In particular the default on Windows machines
> used to be 40 bit, you had to go through extra hoops to generate 128
> bit. If they'd used an OS with 128 bit keys, then maybe we wouldn't
> have been able to read the files?
> 
> I still think export restrictions are a bad idea, but what does this
> mean?

It's real-world proof that no matter how hard they try, open-source
solutions will not catch on because all users, even terrorists, still
need to be able to read those damn Word and Visio attachments.
				- Adam

-----
Surgam, Inc. is a technology consulting firm with strong background in
delivering scalable and robust enterprise web and IT applications.
http://www.surgam.net



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post