E***@alt.support.depression.manic.moderated
2007-07-23 22:44:45 UTC
-----BEGIN PGP SIGNED MESSAGE-----
public key certificates only
* issued to users of key recovery
* Yes. Yes. [405]
*
* Export controls codified: 56-bit limit
* on encryption exports, no judicial
* review.
* No. Yes. [301-308]
*
* Crime for use of encryption in
* furtherance of a crime.
* Yes. Use of a licensed KRA
* is a defense.
* Yes. No KRA defense. [104]
*
* Crime for issuance of a key in
* furtherance of a crime.
* No. Yes. [105]
*
* Gov't access to keys by subpoena
* without notice and or judicial approval
* Yes. Yes. [106]
*
* Foreign gov't access to keys
* Yes. Yes. [106]
*
* Federal procurements require key
* recovery.
* No. Yes. [201-207]
*
* Federal funding (Internet II,
* universities, etc.) requires use of key
* recovery.
* No. Yes. [201-207]
*
* "Safe harbor" liability protections for
* licensed CA's and recovery agents
* Yes. Yes. [501-505] Less extensive
* than Administration draft.
*
* Requires Pres. to negotiate for
* international key recovery.
* No. Yes. [Title 6]
*
public key certificates only
* issued to users of key recovery
* Yes. Yes. [405]
*
* Export controls codified: 56-bit limit
* on encryption exports, no judicial
* review.
* No. Yes. [301-308]
*
* Crime for use of encryption in
* furtherance of a crime.
* Yes. Use of a licensed KRA
* is a defense.
* Yes. No KRA defense. [104]
*
* Crime for issuance of a key in
* furtherance of a crime.
* No. Yes. [105]
*
* Gov't access to keys by subpoena
* without notice and or judicial approval
* Yes. Yes. [106]
*
* Foreign gov't access to keys
* Yes. Yes. [106]
*
* Federal procurements require key
* recovery.
* No. Yes. [201-207]
*
* Federal funding (Internet II,
* universities, etc.) requires use of key
* recovery.
* No. Yes. [201-207]
*
* "Safe harbor" liability protections for
* licensed CA's and recovery agents
* Yes. Yes. [501-505] Less extensive
* than Administration draft.
*
* Requires Pres. to negotiate for
* international key recovery.
* No. Yes. [Title 6]
*