Question....

Bernardo B. Terrado bbt at mudspring.uplb.edu.ph
Mon Aug 3 01:34:25 PDT 1998


How does a hardware encryption device work?


Does it need human intervention to convert a plaintext to ciphertext
or do we still give the instructions?

Correct me if I'm wrong, the key escrow is a hardware encryption device.


That's all for now, thanks.



Bernie





===============================================================================
You give the words  you have spoken,
   it is not lended and are not taken back.
It is like what The Corrs sung "...you're forgiven not forgotten...."









More information about the cypherpunks-legacy mailing list