Thu, 03 October 1996 12:20 UTC
Received: from cnri by ietf.org id aa01513; 3 Oct 96 8:20 EDT
Received: from neptune.hq.tis.com by CNRI.Reston.VA.US id aa08108; 3 Oct 96 8:20 EDT
Received: from neptune.tis.com by neptune.TIS.COM id aa03275; 3 Oct 96 7:53 EDT
Received: from relay.hq.tis.com by neptune.TIS.COM id aa29100; 3 Oct 96 0:04 EDT
Received: by relay.hq.tis.com; id AAA12822; Thu, 3 Oct 1996 00:07:58 -0400
Received: from sol.hq.tis.com(10.33.1.100) by relay.tis.com via smap (V3.1.1) id xma012820; Thu, 3 Oct 96 00:07:30 -0400
Received: from relay.hq.tis.com by tis.com (4.1/SUN-5.64) id AA20995; Thu, 3 Oct 96 00:09:35 EDT
Received: by relay.hq.tis.com; id AAA12817; Thu, 3 Oct 1996 00:07:28 -0400
Received: from bloom-beacon.mit.edu(18.181.0.26) by relay.tis.com via smap id xma012815; Thu, 3 Oct 96 00:07:15 -0400
Received: (from uucp@localhost) by bloom-beacon.MIT.EDU (8.6.13/25-eef) with
X-Message-ID:
Message-ID: <20150415230917.23538.68921.ARCHIVE@ietfa.amsl.com>
X-Date: (the original message had no date)
Date: Thu, 03 Oct 1996 19:20:00 -0000
UUCP id AAA14497 for pem-dev@tis.com; Thu, 3 Oct 1996 00:03:25 -0400 Received: from localhost by orchard.medford.ma.us (8.6.9/1.34) id EAA02879; Thu, 3 Oct 1996 04:00:43 GMT Message-Id: <199610030400.EAA02879@orchard.medford.ma.us> To: Peter Williams <peter@verisign.com> Cc: "pem-dev@tis.com" <pem-dev@tis.com>, "'Frederik H. Andersen'" <fha@dde.dk> Subject: Re: Sad situation!!! In-Reply-To: Your message of "Wed, 2 Oct 1996 11:19:41 -0700 ." <9610021443.aa21905@neptune.TIS.COM> Date: Thu, 03 Oct 1996 00:00:20 -0400 From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us> MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM Sender: pem-dev-approval@neptune.tis.com Precedence: bulk Its not believable, given the personal credibilty problems which would result, that a PGP trademarked product will ever support key recovery Actually, I thought Viacrypt's PGP 4.0 business edition implemented a form of key recovery. (The above assumes, corporates do in fact demand key recovery, to control access to their own property.) Right, but the business need is for key recovery for documents held over the long term -- to recover from "lost" keys and "lost" employees; I don't think there's a business need for key recovery for real-time communications ... if the business owns one or both ends, they can tap there; if they don't own both ends, they're probably a network service provider and they don't really *want* to know what their customers are doing with their network. Government interest in key recovery seems primarily focussed towards wiretapping conversations in real time. - Bill