Leahy's Crypto Wake-up Call

William H. Geiger III whgiii at invweb.net
Sun Apr 5 20:39:46 PDT 1998


In <199804060308.XAA25459 at camel7.mindspring.com>, on 04/05/98 
   at 11:08 PM, John Young <jya at pipeline.com> said:

>  Third, legislation should establish both procedures and 
>standards for access by law enforcement to decryption keys 
>or decryption assistance for both encrypted communications 
>and stored electronic information and only permit such access  upon court
>order authorization, with appropriate notice and  other procedural
>safeguards;

And just *how* do they plan on doing this without either backdoors or
escrow??

>  Fourth, legislation should establish both procedures and 
>standards for access by foreign governments and foreign law  enforcement
>agencies to the plaintext of encrypted 
>communications and stored electronic information of United 
>States persons;

I think not.

They just don't get it.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html                        
---------------------------------------------------------------







More information about the cypherpunks-legacy mailing list