"Steven M. Bellovin" writes: -+-------------------------- | .............................. -- that leaves open the possibility of a | protocol change that implemented some sort of Clipper-like functionality. | A silent change like that would be *very* ominous. |
I'm reminded of Adi Shamir's 2004 Turing Award Lecture * Absolutely secure systems do not exist * To halve your vulnerability, you have to double your expenditure * Cryptography is typically bypassed, not penetrated --dan --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]