[770] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: key recovery vs data backup

daemon@ATHENA.MIT.EDU (Adam Shostack)
Fri May 9 13:56:42 1997

From: Adam Shostack <adam@homeport.org>
In-Reply-To: <199705090341.UAA00226@crypt.hfinney.com> from Hal Finney at "May 8, 97 08:41:29 pm"
To: hal@rain.org (Hal Finney)
Date: Fri, 9 May 1997 11:53:35 -0400 (EDT)
Cc: cryptography@c2.net

Hal Finney wrote:

| The problem with the key-safe model is that it does not handle outgoing
| mail or other data.  Outgoing email will be encrypted with keys of
| the destination, and management won't have access to its contents in
| a key-safe model.  For some businesses this is an even more important
| requirement than local or incoming data access, because they are afraid
| their employees will export company secrets under the cover of encrypted
| email.

As opposed to unencrypted zip disk?  This is where policies really
come in handy; you force people to confront the inconsistencies in
their thoughts by writing that internet connections should be
searched, but not people's bags.

"Never underestimate the bandwidth of a station wagon full of backup
tapes hurtling down the highway."

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume



home help back first fref pref prev next nref lref last post