home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!ames!sun-barr!cs.utexas.edu!sdd.hp.com!swrinde!zaphod.mps.ohio-state.edu!usc!news.service.uci.edu!ucivax!news.claremont.edu!jarthur.claremont.edu!ebrandt
- From: ebrandt@jarthur.claremont.edu (Eli Brandt)
- Subject: Re: A Copper Balloon
- Message-ID: <1992Nov11.224434.5499@muddcs.claremont.edu>
- Sender: news@muddcs.claremont.edu (The News System)
- Organization: Harvey Mudd College, Claremont, CA 91711
- References: <1992Nov7.142220.1683@guvax.acc.georgetown.edu> <1dm50cINNcse@transfer.stratus.com> <1992Nov10.090133.1707@guvax.acc.georgetown.edu>
- Date: Wed, 11 Nov 1992 22:44:34 GMT
- Lines: 23
-
- In article <1992Nov10.090133.1707@guvax.acc.georgetown.edu> denning@guvax.acc.georgetown.edu writes:
- >Whatever regulation, if any, might be considered, it would seem that
- >it would have to be aimed mostly at crypto products, not use.
-
- That is, it would affect law-abiding people who just want to use
- off-the-shelf black-box GTE KryptoFones. It would not affect anyone
- who has the incentive -- e.g. fear of jail -- to hack together a
- system from a few PC's and modems, and some crypto software snarfed
- from Finland.
-
- Sure, if the bad guy talks in the clear on a standard phone line,
- your third-party listening scheme can nail him. But we can do that
- anyway -- and according to the government's numbers, we only do it a
- trivial number of times a year.
-
- ObCrypto: Assuming government good-faith in an eavesdropping
- protocol is like assuming algorithm secrecy in a
- cryptographic protocol.
-
- >Dorothy Denning
-
- Eli ebrandt@jarthur.claremont.edu
-
-