
-----BEGIN PGP SIGNED MESSAGE----- In <3.0.2.32.19970717100056.00733db4@netcom10.netcom.com>, on 07/17/97 at 10:00 AM, Lucky Green <shamrock@netcom.com> said:
At 09:16 AM 7/17/97 -0700, Bill Frantz wrote:
It seems to me that someone who has a one year export approved Verisign cert should use it to authenticate a new top-level CA cert which they pass to their customers. Cut Verisign and their nosy/noisy partner out of the loop.
Only a valid VeriSign Global ID cert (an X.509 v3 cert with a special extension) will activate the strong encryption in exportable browsers. This is hardcoded into Navigator and Internet Explorer.
Yep, fairly simmilar to "policy tokens" that were disscused on the list last year. Let's face it people the management of Nut$cape & Mick$loth are a bunch of rat bastards who would sell their own mothers to make a buck. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBM85khI9Co1n+aLhhAQFjlQP/a5Cp4KTDNKh0wzvF/Y6YoJOd0u2swbvv j02akFcab+mgfYGvEq9qUOmEoxw/jJ+4XXas0Zw/Ap6I8QcNEqRUQ/vAzR0UgUzo m039NpNzT8KTo8TtX6Ry2Zhob2Wk3cpZ2+1H+mOpmYKBbXd6PZfna4u6sk2W6BTk zNjh79taSDQ= =TuK9 -----END PGP SIGNATURE-----