[751] in cryptography@c2.net mail archive
Re: key recovery vs data backup
daemon@ATHENA.MIT.EDU (Jeff Weinstein)
Thu May 8 11:48:52 1997
Date: Wed, 07 May 1997 21:50:00 -0700
From: jsw@netscape.com (Jeff Weinstein)
Reply-To: jsw@netscape.com
To: Carl Ellison <cme@cybercash.com>
CC: Kent Crispin <kent@songbird.com>, cryptography@c2.net
Carl Ellison wrote:
> I was saying that if Sam needs to read my encrypted file/mail, then I
> should list Sam as a crypto-recipient. If Acme,Inc. needs to read my
> encrypted file/mail, then I should list Acme,Inc. as a crypto-recipient.
>
> There's no safe of keys. It's even simpler to explain to an
> executive.
And the government can just mandate that all encryption software add
US Govt. Escrow Agency as a recipient. Isn't this what Lotus did?
This is a lot scarrier to me than the Government having to get a court
order and present it to a company to get access to an encrypted message.
--Jeff
--
Jeff Weinstein - Electronic Munitions Specialist
Netscape Communication Corporation
jsw@netscape.com - http://home.netscape.com/people/jsw
Any opinions expressed above are mine.