[751] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: key recovery vs data backup

daemon@ATHENA.MIT.EDU (Jeff Weinstein)
Thu May 8 11:48:52 1997

Date: Wed, 07 May 1997 21:50:00 -0700
From: jsw@netscape.com (Jeff Weinstein)
Reply-To: jsw@netscape.com
To: Carl Ellison <cme@cybercash.com>
CC: Kent Crispin <kent@songbird.com>, cryptography@c2.net

Carl Ellison wrote:
> I was saying that if Sam needs to read my encrypted file/mail, then I
> should list Sam as a crypto-recipient.  If Acme,Inc. needs to read my
> encrypted file/mail, then I should list Acme,Inc. as a crypto-recipient.
> 
> There's no safe of keys.  It's even simpler to explain to an
> executive.

  And the government can just mandate that all encryption software add
US Govt. Escrow Agency as a recipient.  Isn't this what Lotus did?
This is a lot scarrier to me than the Government having to get a court
order and present it to a company to get access to an encrypted message.

	--Jeff

-- 
Jeff Weinstein - Electronic Munitions Specialist
Netscape Communication Corporation
jsw@netscape.com - http://home.netscape.com/people/jsw
Any opinions expressed above are mine.

home help back first fref pref prev next nref lref last post