Security flaws introduced by "other readers" in CMR

Greg Broiles gbroiles at netbox.com
Sat Oct 18 02:59:25 PDT 1997



Adam Back writes:
>You have a dual concern: you are trying to protect against big brother
>and against little brother.

At the technical level, is there a meaningful difference between the
brothers? Aren't we really talking about third-party access to
communications, and second-party access to stored data ... with the
"brother" distinction being one made at a social/political level, as a
judgement about the legitimacy of the access or the size of the actor,
rather than the character of the access?


--
Greg Broiles                | US crypto export control policy in a nutshell:
gbroiles at netbox.com         | Export jobs, not crypto.
http://www.io.com/~gbroiles | http://www.parrhesia.com







More information about the cypherpunks-legacy mailing list