[3078] in cryptography@c2.net mail archive
Re: practical encryption
daemon@ATHENA.MIT.EDU (Richard Outerbridge)
Sun Jul 26 14:37:13 1998
In-Reply-To: <35B8799A.BEFAC552@stud.uni-muenchen.de>
Date: Sat, 25 Jul 1998 08:21:52 -0400
To: cryptography@c2.net
From: Richard Outerbridge <outer@interlog.com>
Cc: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
1998-07-25 08:04:29 EDT
Mok-Kong Shen wrote:
>Your idea is fine. However, 'so easy they don't know it's there'
>is difficult to achieve. Do you mean something, say, that Netscape
>incorporates into its products? There problems can arise. I don't
>see a better way than that the user consciously encrypt his
>messages with an algorithm of his own choice and send them, though
>he may automate the process, say, with a batch file or the like.
It has to become like the ground wire in electrical supplies. There
was a time, not so very long ago, when the standard household power
outlet only had two prongs. Crypto has to come built in, like the
third prong. Then the user, even if she will never know why she
needs to, simply has to plug the right tool into the right socket.
The only time the user should need to exert conscious effort is to
override the safeguards - by using a cheater adapter, for example.
outer
<outer@interlog.com> :
"Just an eccentric soul with a curiosity for the bizarre."