Strong encryption can, as a practical matter, ensure the safety of a
message transmitted from computer S to computer T.

It is, however, important to remember that this encryption is useless
if the content of that message can be purloined at S before it is
encrypted or at T after it has been decrypted.

Moreover, there is anecdotal evidence that the five-eyes organizations
are alert to and even that they are already actively exploiting these
two vulnerabilities.  How not!  And if so, other less high-minded
groups are too.

John Gilmore, Ashland, MA 01721 - USA

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to