[147172] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] End to end

daemon@ATHENA.MIT.EDU (Christoph Gruber)
Tue Sep 17 10:47:36 2013

X-Original-To: cryptography@metzdowd.com
From: Christoph Gruber <grisu@guru.at>
In-Reply-To: <CAMm+Lwhn=JDoUoPn_SBLgOA5f6sxcRs_SFit3CrOS97wPk9EQg@mail.gmail.com>
Date: Tue, 17 Sep 2013 07:55:04 +0200
To: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


--===============0948195669156681081==
Content-Type: multipart/alternative;
	boundary=Apple-Mail-DCC7BF5B-1CF7-48F0-827D-F4C173BA7157
Content-Transfer-Encoding: 7bit


--Apple-Mail-DCC7BF5B-1CF7-48F0-827D-F4C173BA7157
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

On 2013-09-16 Phillip Hallam-Baker <hallam@gmail.com> wrote:
[snip]
> If people are sending email through the corporate email system then in man=
y cases the corporation has a need/right to see what they are sending/receiv=
ing.
[snip]

Even if an organisation has a need/right to look into people's email, it is n=
ecessary to protect the communication on transport and storage. Of course a c=
ertain way of key recovery has to be in place.

Just my 2 cents

> --=20
> Website: http://hallambaker.com/
> _______________________________________________
> The cryptography mailing list
> cryptography@metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography

--Apple-Mail-DCC7BF5B-1CF7-48F0-827D-F4C173BA7157
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div>On 2013-09-16 Phillip Hallam-Baker &lt;<a href="mailto:hallam@gmail.com">hallam@gmail.com</a>&gt; wrote:</div><div>[snip]</div><blockquote type="cite"><div><div dir="ltr"><div>If people are sending email through the corporate email system then in many cases the corporation has a need/right to see what they are sending/receiving.</div></div></div></blockquote><div>[snip]</div><div><br></div><div>Even if an organisation has a need/right to look into people's email, it is necessary to protect the communication on transport and storage. Of course a certain way of key recovery has to be in place.</div><div><br></div><div>Just my 2 cents</div><br><blockquote type="cite"><div><div dir="ltr"><div>-- <br>Website: <a href="http://hallambaker.com/">http://hallambaker.com/</a><br>
</div></div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>The cryptography mailing list</span><br><span><a href="mailto:cryptography@metzdowd.com">cryptography@metzdowd.com</a></span><br><span><a href="http://www.metzdowd.com/mailman/listinfo/cryptography">http://www.metzdowd.com/mailman/listinfo/cryptography</a></span></div></blockquote></body></html>
--Apple-Mail-DCC7BF5B-1CF7-48F0-827D-F4C173BA7157--

--===============0948195669156681081==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============0948195669156681081==--

home help back first fref pref prev next nref lref last post