From: KPJ (kpj@sics.se)
Date: Mon Apr 29 2002 - 13:36:21 MDT
It appears as if Harvey Newstrom <mail@HarveyNewstrom.com> wrote:
|On Monday, April 29, 2002, at 05:38 am, KPJ wrote:
|> |Furthermore, this 'tapping' only works for networks which are unsecure,
|> |and for unencrypted packets on the worldwide network.
|
|No. Weak encryption is easily decrypted by large government computers.
|Strong encryption is illegal to export, and so further investigation is
|warranted because of a possible export crime. Strong encryption coming
|into the US that was not originally funded from US sources merits
|further investigation for possible terrorist connections or activity by
|foreign governments. I can't think of any type of traffic that is
|excluded from these systems.
No, KPJ did not write that. KPJ quoted Mike Lorrey's post.
As to the question at hand, I understand that U.S. government have released
``strong encryption'' for export for some time now. Have they changed that?
I have seen no mentioning of it, anywhere.
As to encrypted traffic, knowledgeable people tend to think that No Such
Agency today has the computational resources to investigate, in real time,
all traffic going into and out of the U.S. Also, such protocols as the GSM
phone A and B encryption protocols will offer no protection any more.
This archive was generated by hypermail 2.1.5 : Sat Nov 02 2002 - 09:13:42 MST