Elon University

Electronic Privacy

The odds are even that any form of encryption save “Clipper”-type will be outlawed, and – like guns – will be only available to law breakers (in the main).

Electronic Privacy

Watergate would not have been difficult with such a technology. Eventually they will want e-mail records of who sends to whom and later what was sent.

Electronic Privacy

Clipper and the new digital telephony bills are a first step into what Orwell should have called 1994. It is the start of a slide. I consider the digital telephony bill the most dangerous … I see the slide ending with more and more government intervention in our private conversations. It will be the equivalent in cyberspace of having mikes in our living and bedrooms.

Computer-Based Communication

The electronic message will overcome its current limitations in form and ease of use. When that happens, we can expect that the meeting activities will receive the next big wave of information-technology investments.

Don’t Worry be Happy: Why Clipper is Good for You

If you want to keep your neighbors from listening in on your cordless phone, if you want to keep unscrupulous competitors from stealing your secrets, even if you want to keep foreign governments from knowing your business plans, key escrow encryption will provide all the security you need, and more.

Don’t Worry be Happy: Why Clipper is Good for You

We can’t afford as a society to protect pedophiles and criminals today just to keep alive the far-fetched notion that some future tyrant will be brought down by guerrillas wearing bandoleers and pocket protectors and sending PGP-encrypted messages to each other across cyberspace.

Don’t Worry be Happy: Why Clipper is Good for You

The world will be a safer place if criminals cannot take advantage of a ubiquitous, standardized encryption infrastructure that is immune from any conceivable law enforcement wiretap. Even if you’re worried about illegal government taps, key escrow reinforces the existing requirement that every wiretap and every decryption must be lawfully authorized. The key escrow system means that proof of authority to tap must be certified and audited, so that illegal wiretapping by a rogue prosecutor or police officer is, as a practical matter, impossible.

Chapter 9: Accessing the Internet

People will always use mail for business and personal communications … Electronic mail may represent the epitome of mail distribution, and the Internet may be the best vehicle.