Re: "Key Escrow" --- the very idea
At 4:49 PM 7/21/94 -0700, Mike_Spreitzer.PARC@xerox.com wrote:
(1) I'm not an anarchist. [snip]
I'm a congenital republican. [snip]
(2) I think crimes can be committed in cyberspace... [snip]
So do I. [snip]
(4) If you accept points (1) and (2) above, you're left wanting a way to implement searches in cyberspace when due process is followed.
[Plea for better key escrow removed] I've never gotten into the Clipper discussion before now. I've assumed (somewhat lazily, I might add) that market forces would kill it, if nothing else. I am much more in other consequences of strong-crypto and global public-access computer networks; e$ and all that... I'm not so sure that wiretapping was ever a good idea, but the "private life" of the technology which enabled it ensured its use. Like machine guns, nuclear weapons and semi-automatic firearms, weapons (wiretapping is as surely a weapon as any of the above) will be used. Fortunately, counter-weapons arise. Gentlemen didn't read each other's mail because they couldn't do it practically. Telephony and signals intellegence changed that. People found that they could, and they did it. Now the technological pendulum has swung back to the days where letters were sealed in wax with unique seals. I would like to propose, probably not the first time on this list, an acceptable, time-honored method of determining the contents of a secure conversation. Snitches. That's they used before wiretaps, and it seemed to work well enough then. A contempt of court citation for refusing a warranted search seems strong enough to handle the rest of a government's prosecutory urges. Cheers, Bob ----------------- Robert Hettinga (rah@shipwright.com) "There is no difference between someone Shipwright Development Corporation who eats too little and sees Heaven and 44 Farquhar Street someone who drinks too much and sees Boston, MA 02331 USA snakes." -- Bertrand Russell (617) 323-7923
On Thu, 21 Jul 1994, Robert Hettinga wrote:
I'm a congenital republican. Hmm, I hear medical science has tracked down the gene for that and will have a cure soon.
I like crime, but believe that imoral behavior is wrong. I believe you can behave imoraly in cyberspace.
I would like to propose, probably not the first time on this list, an acceptable, time-honored method of determining the contents of a secure conversation. Snitches. ABSOLUTELY! The fact is if you can't get someone to snitch, IT IS NOT A CRIME(moraly)! I dare anyone to come up with a counterexample.
Berzerk.
Berzerk writes:
On Thu, 21 Jul 1994, Robert Hettinga wrote:
I would like to propose, probably not the first time on this list, an acceptable, time-honored method of determining the contents of a secure conversation. Snitches. ABSOLUTELY! The fact is if you can't get someone to snitch, IT IS NOT A CRIME(moraly)! I dare anyone to come up with a counterexample.
Berzerk.
I've heard of incidents where a group of people dressed in white sheets hung other people with dark skin. Not one of those white-sheeted people snitched, in many cases. If you were limiting your assertion to crime over the net, I suggest that the long, interesting history of confidence men is a refutation. Done correctly, in many cases the victim doesn't even know he has been conned. Regards, Patrick May ------------------------------------------------------------------------ "A contract programmer is always intense." pjm@gasco.com
On Fri, 22 Jul 1994, Patrick J. May wrote:
I've heard of incidents where a group of people dressed in white sheets hung other people with dark skin. Not one of those white-sheeted people snitched, in many cases.
True, however the INFORMATOIN that something like this happened did leak out. I would assert that this was not a case of a blockage of information but a lack of will on the part of those who did know to take action.
If you were limiting your assertion to crime over the net, I suggest that the long, interesting history of confidence men is a refutation. Done correctly, in many cases the victim doesn't even know he has been conned.
Then have they? Can you give an example? Berzerk.
participants (3)
-
Berzerk -
pjm@gasco.com -
rah@shipwright.com