[714] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: key recovery vs data backup

daemon@ATHENA.MIT.EDU (Carl Ellison)
Tue May 6 17:52:05 1997

Date: Tue, 06 May 1997 17:15:35 -0400
To: das@razor.engr.sgi.com (Anil Das)
From: Carl Ellison <cme@cybercash.com>
Cc: Adam Back <aba@dcs.ex.ac.uk>, cryptography@c2.net
In-Reply-To: <9705061345.ZM19650@razor.engr.sgi.com>

At 01:45 PM 5/6/97 -0700, Anil Das wrote:
>	Far as I can see the intention is indeed for someone else
>to be able to read your email. Just that that someone else is not
>the government.
>
>	Customer != User
>
>	There are many corporations who have a stated policy that
>all email crossing the firewall will be examined to make sure that
>no corporate information is being leaked or stolen.

The appropriate way to achieve this is to list the corporate firewall
as a crypto recipient (or to list your group manager as one, if
your mail needs to be readable by him) -- not to provide a default
access path which might be exploited by the enemy.



+------------------------------------------------------------------+
|Carl M. Ellison  cme@cybercash.com   http://www.clark.net/pub/cme |
|CyberCash, Inc.                      http://www.cybercash.com/    |
|207 Grindall Street   PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2 |
|Baltimore MD 21230-4103  T:(410) 727-4288  F:(410)727-4293        |
+------------------------------------------------------------------+


home help back first fref pref prev next nref lref last post