Ke Escrow Procedures...

Peter Wayner pcw at access.digex.net
Fri Sep 17 14:01:38 PDT 1993



Carl Ellison writes:


Meanwhile, where is the proof that the key being requested corresponds to
a person on whom a wiretap has been ordered?


When I saw a preliminary briefing given to the CSSPAB, the DOJ suggested
that there would be no list kept equating names to Clipper Chip ID #.
Of course such a list would be a real disaster because people would
routinely be shifting hardware left and right. Any list would become
immediately out of date. 

This means that there is really no feasible way to discover misuse.

-Peter






More information about the cypherpunks-legacy mailing list