Thu, 03 October 1996 12:20 UTC

Received: from cnri by ietf.org id aa01513; 3 Oct 96 8:20 EDT
Received: from neptune.hq.tis.com by CNRI.Reston.VA.US id aa08108; 3 Oct 96 8:20 EDT
Received: from neptune.tis.com by neptune.TIS.COM id aa03275; 3 Oct 96 7:53 EDT
Received: from relay.hq.tis.com by neptune.TIS.COM id aa29100; 3 Oct 96 0:04 EDT
Received: by relay.hq.tis.com; id AAA12822; Thu, 3 Oct 1996 00:07:58 -0400
Received: from sol.hq.tis.com(10.33.1.100) by relay.tis.com via smap (V3.1.1) id xma012820; Thu, 3 Oct 96 00:07:30 -0400
Received: from relay.hq.tis.com by tis.com (4.1/SUN-5.64) id AA20995; Thu, 3 Oct 96 00:09:35 EDT
Received: by relay.hq.tis.com; id AAA12817; Thu, 3 Oct 1996 00:07:28 -0400
Received: from bloom-beacon.mit.edu(18.181.0.26) by relay.tis.com via smap id xma012815; Thu, 3 Oct 96 00:07:15 -0400
Received: (from uucp@localhost) by bloom-beacon.MIT.EDU (8.6.13/25-eef) with
X-Message-ID:
Message-ID: <20150415230917.23538.68921.ARCHIVE@ietfa.amsl.com>
X-Date: (the original message had no date)
Date: Thu, 03 Oct 1996 19:20:00 -0000

UUCP id AAA14497 for pem-dev@tis.com; Thu, 3 Oct 1996 00:03:25 -0400
Received: from localhost by orchard.medford.ma.us (8.6.9/1.34)
	id EAA02879; Thu, 3 Oct 1996 04:00:43 GMT
Message-Id: <199610030400.EAA02879@orchard.medford.ma.us>
To: Peter Williams <peter@verisign.com>
Cc: "pem-dev@tis.com" <pem-dev@tis.com>, 
    "'Frederik H. Andersen'" <fha@dde.dk>
Subject: Re: Sad situation!!! 
In-Reply-To: Your message of "Wed, 2 Oct 1996 11:19:41 -0700 ."
             <9610021443.aa21905@neptune.TIS.COM> 
Date: Thu, 03 Oct 1996 00:00:20 -0400
From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>
MMDF-Warning:  Unable to confirm address in preceding line at neptune.TIS.COM
MMDF-Warning:  Unable to confirm address in preceding line at neptune.TIS.COM
Sender: pem-dev-approval@neptune.tis.com
Precedence: bulk

   Its not believable, given the personal credibilty problems which
   would result, that a PGP trademarked product will ever support key
   recovery

Actually, I thought Viacrypt's PGP 4.0 business edition implemented a
form of key recovery.

   (The above assumes, corporates do in fact demand key recovery, to control
   access to their own property.)

Right, but the business need is for key recovery for documents held
over the long term -- to recover from "lost" keys and "lost"
employees; I don't think there's a business need for key recovery for
real-time communications ... if the business owns one or both ends,
they can tap there; if they don't own both ends, they're probably a
network service provider and they don't really *want* to know what
their customers are doing with their network.

Government interest in key recovery seems primarily focussed towards
wiretapping conversations in real time.

				- Bill

  •