[2436] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: bogus telecommunications identifying information

daemon@ATHENA.MIT.EDU (Jay Holovacs)
Wed Apr 1 09:40:33 1998

Date: Wed, 01 Apr 1998 08:27:30 -0500
To: Rick Smith <rsmith@securecomputing.com>, die@die.com, cryptography@c2.net
From: Jay Holovacs <holovacs@idt.net>
In-Reply-To: <v03007813b145d26aa9d9@[172.17.1.150]>

At 05:05 PM 3/30/98 -0600, Rick Smith wrote:

>
>This reminds me of the "if you use crypto, your local felony becomes a
>federal crime" statutes. If I use my cell phone to con some little old lady
>out of her fortune and the phone's transparent crypto feature happened to
>be enabled, I've unintentionally become a federal offender.
>
It gets more ominous, not just to actually criminal activities such as
conning old ladies. Imagine what Hoover could have done with ML King, if he
were using encryption to plan demonstrations and civil disobedience.
Automatically a federal case, get him off the newspapers for 5 years. A
totalitarian way to suppress political dissent.

Steganography is going to be more and more important.

Jay



home help back first fref pref prev next nref lref last post