home *** CD-ROM | disk | FTP | other *** search
/ NetNews Usenet Archive 1992 #26 / NN_1992_26.iso / spool / sci / crypt / 4536 < prev    next >
Encoding:
Text File  |  1992-11-09  |  1.7 KB  |  39 lines

  1. Newsgroups: sci.crypt
  2. Path: sparky!uunet!walter!qualcom.qualcomm.com!servo.qualcomm.com!karn
  3. From: karn@qualcom.qualcomm.com (Phil Karn)
  4. Subject: Re: Registered Keys - why the need?
  5. Message-ID: <1992Nov9.231305.19242@qualcomm.com>
  6. Originator: karn@servo.qualcomm.com
  7. Sender: news@qualcomm.com
  8. Nntp-Posting-Host: servo.qualcomm.com
  9. Reply-To: karn@chicago.qualcomm.com
  10. Organization: Qualcomm, Inc
  11. References: <715.517.uupcb@grapevine.lrk.ar.us> <1992Nov01.233637.138278@watson.ibm.com> <1992Nov3.090942.1626@guvax.acc.georgetown.edu> <1992Nov4.202104.3851@chpc.org> <1992Nov7.133526.1682@guvax.acc.georgetown.edu>
  12. Date: Mon, 9 Nov 1992 23:13:05 GMT
  13. Lines: 24
  14.  
  15. In article <1992Nov7.133526.1682@guvax.acc.georgetown.edu>, denning@guvax.acc.georgetown.edu writes:
  16. |> Law enforcers would not be able to activate a tap.
  17. [...]
  18. |> My understanding is that the phone companies keep an audit of all taps.
  19.  
  20. Lest this seem a little too reassuring, I would like to quote one of
  21. the members of the industry committee that established the standards
  22. for authentication and "privacy" for the new generation of digital
  23. cellular telephones. I asked why the government was so strongly
  24. opposed to the secure encryption of the over-the-air part of a
  25. cellular call when they could still go to the telephone company and
  26. tap the land side of the call where it connects with the regular
  27. public telephone network.
  28.  
  29. The response? A warrant would be required to gain the telephone
  30. company's assistance, and warrants were considered to be "too
  31. impractical" in many cases.
  32.  
  33. Draw your own conclusions. Professor Denning ought to spend some time
  34. in the real world before making proposals that implicitly trust the
  35. government to follow its own rules.
  36.  
  37. Phil
  38.  
  39.