[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: cfp '94 transcript
C'punks,
On Mon, 28 Mar 1994, Jim Miller wrote:
> . . .
>
> A better question to ask would be...
>
> Are there any software or hardware mechanisms, or combinations of
> software and hardware mechanisms, present in the Clipper/EES system
> that supports or enables decryption of intercepted Clipper/EES
> communications without access to escrowed unit keys?
>
> Does that cover it well enough?
I don't think so. There might be some aspect of the "escrowed" keys that
would allow them to be accessed from duplicates or some other end run.
The question should include inquiries that address the accessibility of
the keys outside of the "warrant issued upon a showing of probable cause"
view that many people have fallen for.
S a n d y