[714] in cryptography@c2.net mail archive
Re: key recovery vs data backup
daemon@ATHENA.MIT.EDU (Carl Ellison)
Tue May 6 17:52:05 1997
Date: Tue, 06 May 1997 17:15:35 -0400
To: das@razor.engr.sgi.com (Anil Das)
From: Carl Ellison <cme@cybercash.com>
Cc: Adam Back <aba@dcs.ex.ac.uk>, cryptography@c2.net
In-Reply-To: <9705061345.ZM19650@razor.engr.sgi.com>
At 01:45 PM 5/6/97 -0700, Anil Das wrote:
> Far as I can see the intention is indeed for someone else
>to be able to read your email. Just that that someone else is not
>the government.
>
> Customer != User
>
> There are many corporations who have a stated policy that
>all email crossing the firewall will be examined to make sure that
>no corporate information is being leaked or stolen.
The appropriate way to achieve this is to list the corporate firewall
as a crypto recipient (or to list your group manager as one, if
your mail needs to be readable by him) -- not to provide a default
access path which might be exploited by the enemy.
+------------------------------------------------------------------+
|Carl M. Ellison cme@cybercash.com http://www.clark.net/pub/cme |
|CyberCash, Inc. http://www.cybercash.com/ |
|207 Grindall Street PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2 |
|Baltimore MD 21230-4103 T:(410) 727-4288 F:(410)727-4293 |
+------------------------------------------------------------------+