[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: NYT/CyberTimes on CWD article
- To: [email protected]
- Subject: Re: NYT/CyberTimes on CWD article
- From: [email protected]
- Date: Sat, 6 Jul 96 16:56:44 EDT
- In-Reply-To: <+cmu.andrew.internet.cypherpunks+olrdBjW00UfAI10EoP@andrew.cmu.edu>
- Organization: Dr. Beddoes' Pneumatic Institute
- Sender: [email protected]
>http://www.nytimes.com/library/cyber/week/0706patrol-reporters.html
> "If we believe the encryption scheme has
> been compromised, we will make another
> one."
Heh.
It seems that these companies are going to have a problem as long as
they use lists of *excluded* sites. Forget insight into company
policy; these are global indices of "smut" on the net. (The lists of
the more liberal companies are probably most attractive to those not
titillated by NOW position papers.)
They have to give you the list, and they have to give you software
that uses it, so there's no way to achieve complete secrecy. I think
the best they can do is to distribute a list of hashed URLs.
--
Eli Brandt
[email protected]