[770] in cryptography@c2.net mail archive
Re: key recovery vs data backup
daemon@ATHENA.MIT.EDU (Adam Shostack)
Fri May 9 13:56:42 1997
From: Adam Shostack <adam@homeport.org>
In-Reply-To: <199705090341.UAA00226@crypt.hfinney.com> from Hal Finney at "May 8, 97 08:41:29 pm"
To: hal@rain.org (Hal Finney)
Date: Fri, 9 May 1997 11:53:35 -0400 (EDT)
Cc: cryptography@c2.net
Hal Finney wrote:
| The problem with the key-safe model is that it does not handle outgoing
| mail or other data. Outgoing email will be encrypted with keys of
| the destination, and management won't have access to its contents in
| a key-safe model. For some businesses this is an even more important
| requirement than local or incoming data access, because they are afraid
| their employees will export company secrets under the cover of encrypted
| email.
As opposed to unencrypted zip disk? This is where policies really
come in handy; you force people to confront the inconsistencies in
their thoughts by writing that internet connections should be
searched, but not people's bags.
"Never underestimate the bandwidth of a station wagon full of backup
tapes hurtling down the highway."
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume