[email protected] (Martin Packer) writes:
> Not to disagree with anything anyone has said, I think one thing might 
> work against us:
>
> I don't know when restrictions on encryption were lifted but when I first 
> was involved with encryption in the late 1980's it was pretty restrictive 
> who could have it.
>
> So the point is - because of the restricted availability - it's possible 
> the injection of encryption into sites and applications might be less than 
> desirable.
>
> But I hope the world has changed enough for most sites to have caught up 
> with the need to implement it.

re:
http://www.garlic.com/~lynn/2017c.html#60 [EXTERNAL] ComputerWorld Says: Cobol 
plays major role in U.S. government breaches
http://www.garlic.com/~lynn/2017c.html#61 [EXTERNAL] ComputerWorld Says: Cobol 
plays major role in U.S. government breaches
http://www.garlic.com/~lynn/2017c.html#69 ComputerWorld Says: Cobol plays major 
role in U.S. government breaches

financial has had special dispensation for some (stronger) crypto
... and there was regular gov. representation at financial standards
meetings.

in the 90s, as gov. was loosing control of encryption ... for a time
there was a gov. push for (allowing crypto but) official escrow of all
(encyrption) keys ... I was rep to the key escrow meetings. I did make
the case of differentiation between keys used for authentication and
keys used for encruyption ... and that it is basic security violation
for any but the individual have possession of their authentication
keys. the gov.  whined that people could cheat and use their
authentication keys for encryption .... but that was about the last key
escrow meeting.

trivia: in the big 1jan1983 change over of arpanet to internetworking
protocol ... there was approx. 100 IMP network nodes and 255 connected
hosts ... at the time when the internal network was rapidly approaching
1000 nodes. This is old post with list of corporate locations that added
one or more network nodes during 1983:
http://www.garlic.com/~lynn/2006k.html#8 Arpa address


there was especially difficult problems when links (between corporate
nodes) cross national boundaries (and all internal links required
encryption). ... past internal network posts
http://www.garlic.com/~lynn/subnetwork.html#internalnet

-- 
virtualization experience starting Jan1968, online at home since Mar1970

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to