📄 15267
字号:
Path: cantaloupe.srv.cs.cmu.edu!das-news.harvard.edu!ogicse!network.ucsd.edu!qualcom.qualcomm.com!qualcom!rdippoldFrom: rdippold@qualcomm.com (Ron "Asbestos" Dippold)Newsgroups: sci.cryptSubject: Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]Keywords: encryption, wiretap, clipper, key-escrow, MykotronxMessage-ID: <rdippold.735042679@qualcom>Date: 17 Apr 93 10:31:19 GMTArticle-I.D.: qualcom.rdippold.735042679References: <16695@rand.org> <16696@rand.org> <strnlghtC5LGFI.JqA@netcom.com> <jhesseC5LuMC.2Ex@netcom.com>Sender: news@qualcomm.comOrganization: Qualcomm, Inc., San Diego, CALines: 11Originator: rdippold@qualcom.qualcomm.comNntp-Posting-Host: qualcom.qualcomm.comjhesse@netcom.com (John Hesse) writes:>Oh great. Wonderful news. Nobody can listen in--except the feds.And anybody who can get the keys from the escrow company. This is adatabase that's going to take plenty of updating - they think they cankeep it secure? Please... and that's just primary, not secondarysources, such as police using the key under a warrant. Would anyonebe surprised if they just "neglected" to erase the key if it turnedout they couldn't nail you on anything?-- Nourish a waif and it will pick out your eyes.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -