- From: Brian E Carpenter <brian@hursley.ibm.com>
- Date: Thu, 29 Jul 1999 12:22:40 -0500
- To: discuss@apps.ietf.org
Keith Moore wrote: > > > We might develop solutions which are both technially sound and > > acceptable to the export control people. For example, we might use > > different algorithms for encryption of content, than for the > > encryption used in identification and authorization services. > > what makes you think that this approach is technically sound? In any case, why is it more acceptable for someone to read my mail than to forge it? The IETF plenary debate on this topic in Danvers gave pretty unambiguous input that we should do what's right from a security viewpoint, not what suits governments. Brian
Received on Thursday, 29 July 1999 13:25:38 UTC