📄 15429
字号:
> marketplace; and > > -- the need of U.S. companies to manufacture and export> high technology products.The ITARs seem to slightly impeed this.> The President has directed early and frequent consultations with> affected industries, the Congress and groups that advocate the> privacy rights of individuals as policy options are developed.> The Administration is committed to working with the private> sector to spur the development of a National Information> Infrastructure which will use new telecommunications and computer> technologies to give Americans unprecedented access to> information. This infrastructure of high-speed networks> ("information superhighways") will transmit video, images, HDTV> programming, and huge data files as easily as today's telephone> system transmits voice.Note that all this wonderfull stuff will be in secret. Only the 'proper people'will be able to express an opinion, hence only the desired result will emerge.> Since encryption technology will play an increasingly important> role in that infrastructure, the Federal Government must act> quickly to develop consistent, comprehensive policies regarding> its use. The Administration is committed to policies that> protect all Americans' right to privacy while also protecting> them from those who break the law.Encryption and codes have been around for millenia. They are generaly inequilibrium with the technology of the time. The systematic study of cyphershas resulted in a swing in favor of the encrypter, AT THE MOMENT. I have nodoubt that the factoring problem will fall in time. Probably fofr practicalpurposes by the middle of the next century.> Further information is provided in an accompanying fact sheet. > The provisions of the President's directive to acquire the new> encryption technology are also available. > > For additional details, call Mat Heyman, National Institute of> Standards and Technology, (301) 975-2758.> > ---------------------------------> > > QUESTIONS AND ANSWERS ABOUT THE CLINTON ADMINISTRATION'S> TELECOMMUNICATIONS INITIATIVE> > > > > Q: Does this approach expand the authority of government> agencies to listen in on phone conversations?> > A: No. "Clipper Chip" technology provides law enforcement with> no new authorities to access the content of the private> conversations of Americans.> > Q: Suppose a law enforcement agency is conducting a wiretap on> a drug smuggling ring and intercepts a conversation> encrypted using the device. What would they have to do to> decipher the message?> > A: They would have to obtain legal authorization, normally a> court order, to do the wiretap in the first place. They> would then present documentation of this authorization to> the two entities responsible for safeguarding the keys and> obtain the keys for the device being used by the drug> smugglers. The key is split into two parts, which are> stored separately in order to ensure the security of the key> escrow system.> > Q: Who will run the key-escrow data banks?> > A: The two key-escrow data banks will be run by two independent> entities. At this point, the Department of Justice and the> Administration have yet to determine which agencies will> oversee the key-escrow data banks.It is a little hard to critisise a non-proposal.> Q: How strong is the security in the device? How can I be sure> how strong the security is? > > A: This system is more secure than many other voice encryption> systems readily available today.Note we drop back to 'phone-mode' again. If this is a true answer, it can berephrased as " It sucks big time. Anyone who can drive the crypt work-benchwill use it for light amusement before breakfast."> ... While the algorithm will> remain classified to protect the security of the key escrow> system,This link between the security of the key-eschrow, and the actual algorithm is a real winner. Given that I have 2 secret 40 bit numbers, could someone pleaseexplain how the details of an encryption algorithm will reveal them?> ... we are willing to invite an independent panel of> cryptography experts to evaluate the algorithm to assure all> potential users that there are no unrecognized> vulnerabilities.Just make sure you read the CVs REAL carfully, OK.> > Q: Whose decision was it to propose this product?> > A: The National Security Council, the Justice Department, the> Commerce Department, and other key agencies were involved in> this decision. This approach has been endorsed by the> President, the Vice President, and appropriate Cabinet> officials.Quick, with out looking back, What name is missing from that list?> Q: Who was consulted? The Congress? Industry?> > A: We have on-going discussions with Congress and industry on> encryption issues, and expect those discussions to intensify> as we carry out our review of encryption policy. We have> briefed members of Congress and industry leaders on the> decisions related to this initiative.The people who agree with us and who think there is a buck in it for them.> Q: Will the government provide the hardware to manufacturers?> > A: The government designed and developed the key access> encryption microcircuits, but it is not providing the> microcircuits to product manufacturers. Product> manufacturers can acquire the microcircuits from the chip> manufacturer that produces them.The reverse engineering provisions of the 'Mask-work' act could be releventhere.> Q: Who provides the "Clipper Chip"?> > A: Mykotronx programs it at their facility in Torrance,> California, and will sell the chip to encryption device> manufacturers. The programming function could be licensed> to other vendors in the future.> > Q: How do I buy one of these encryption devices? > > A: We expect several manufacturers to consider incorporating> the "Clipper Chip" into their devices.You don't. Not unless you are one of the 'right people'.> Q: If the Administration were unable to find a technological> solution like the one proposed, would the Administration be> willing to use legal remedies to restrict access to more> powerful encryption devices?> > A: This is a fundamental policy question which will be> considered during the broad policy review. The key escrowThey missed the word secret here. He needs a grammar lesson too.> mechanism will provide Americans with an encryption product> that is more secure, more convenient, and less expensive> than others readily available today, but it is just one> piece of what must be the comprehensive approach to> encryption technology, which the Administration is> developing.I would say "less secure, less conveniant, more expensive ( PGP is free ),less available, and more prone to being comprimised"Proofs to the contarary will be welcome. Note PROOF.> The Administration is not saying, "since encryption> threatens the public safety and effective law enforcement,> we will prohibit it outright" (as some countries have> effectively done); nor is the U.S. saying that "every> American, as a matter of right, is entitled to an> unbreakable commercial encryption product."They don't seem to be saying anything that makes much sense. And this proposalDOES prohibit it except in a very limited way. And, this is the one explicitreference to personal rights. It is a denial. And yes, I don't think that theMexicans, Brazilians, and Canucks are included in Clinton et als magnanamousgesture.> ... There is a> false "tension" created in the assessment that this issue is> an "either-or" proposition. Rather, both concerns can be,> and in fact are, harmoniously balanced through a reasoned,> balanced approach such as is proposed with the "Clipper> Chip" and similar encryption techniques.The 'false tension' is false. The balance is between two repugnant points. TheRIGHT to privacy is hand-waved to non-existance by putting it behind the "falseassessment". It is assumed that the removal of the right to take what ever stepsYOU deem suitable to protect YOUR privacy is non negotiable, hence is definedin the govenment language to be non-existant. If you don't agree, you must be acriminal, as only criminals don't agree with out laws. Also note the non-question. "If what is here was not possible..."> Q: What does this decision indicate about how the Clinton> Administration's policy toward encryption will differ from> that of the Bush Administration? > > A: It indicates that we understand the importance of encryption> technology in telecommunications and computing and are> committed to working with industry and public-interest> groups to find innovative ways to protect Americans'> privacy, help businesses to compete, and ensure that law> enforcement agencies have the tools they need to fight crime> and terrorism.It indicates we know that Bush dropped the ball in squashing that nasty < insertsuitable retoric > and will stamp out this disorderly, unruley outbreak offreedom and ultra-national sentiment.> Q: Will the devices be exportable? Will other devices that use> the government hardware?> > A: Voice encryption devices are subject to export control> requirements. Case-by-case review for each export is> required to ensure appropriate use of these devices. The> same is true for other encryption devices. One of the> attractions of this technology is the protection it can give> to U.S. companies operating at home and abroad. With this> in mind, we expect export licenses will be granted on a> case-by-case basis for U.S. companies seeking to use these> devices to secure their own communications abroad. We plan> to review the possibility of permitting wider exportability> of these products.> This one is a real giggle. In Australia or France, they will have to reveal thekeys, and the algorithm. Don't think it's at the top of my list of things I musthave, so the restrictions will protect me from saleks trying to sell me a billof crock.Any for any others using it, they must be nuts!Good luck folks.~Paul
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -