Steven M. Bellovin writes:
 > So -- how should the back door be installed?  In the protocol? In the telco 
 > endpoint?  Is it ethical for security people to work on something that lowers 
 > the security of the system?  Given that it's going to be done anyway, is it 
 > ethical to refrain, lest it be done incompetently?

If something evil is done poorly, is that more or less evil?  Answer
not obvious to me.  In any case, a properly implemented end-to-end
encrypted voice stream traveling over a data path with the CALEA bit
set just allows the FBI easy access to strong crypto.

-- 
-russ nelson <[EMAIL PROTECTED]>  http://russnelson.com
Crynwr sells support for free software  | PGPok | Government schools are so
521 Pleasant Valley Rd. | +1 315 268 1925 voice | bad that any rank amateur
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   | can outdo them. Homeschool!

Reply via email to