[10183] in cryptography@c2.net mail archive
Re: Horseman Number 3: Osama Used 40 bits
daemon@ATHENA.MIT.EDU (Adam Fields)
Thu Jan 17 17:00:40 2002
Message-Id: <200201172147.g0HLlCK18092@sparkle.generation.net>
To: Nelson Minar <nelson@monkey.org>
Cc: "R. A. Hettinga" <rahettinga@earthlink.net>,
cryptography@wasabisystems.com
From: Adam Fields <fields@surgam.net>
In-reply-to: Your message of "Thu, 17 Jan 2002 13:04:31 PST."
<15431.15455.681196.973414@cabernet.nelson.monkey.org>
Date: Thu, 17 Jan 2002 16:47:12 -0500
Nelson Minar says:
> If this report is true, then it's evidence that the previous US crypto
> export policy works. In particular the default on Windows machines
> used to be 40 bit, you had to go through extra hoops to generate 128
> bit. If they'd used an OS with 128 bit keys, then maybe we wouldn't
> have been able to read the files?
>
> I still think export restrictions are a bad idea, but what does this
> mean?
It's real-world proof that no matter how hard they try, open-source
solutions will not catch on because all users, even terrorists, still
need to be able to read those damn Word and Visio attachments.
- Adam
-----
Surgam, Inc. is a technology consulting firm with strong background in
delivering scalable and robust enterprise web and IT applications.
http://www.surgam.net
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com