[email protected] (Martin Packer) writes: > Not to disagree with anything anyone has said, I think one thing might > work against us: > > I don't know when restrictions on encryption were lifted but when I first > was involved with encryption in the late 1980's it was pretty restrictive > who could have it. > > So the point is - because of the restricted availability - it's possible > the injection of encryption into sites and applications might be less than > desirable. > > But I hope the world has changed enough for most sites to have caught up > with the need to implement it.
re: http://www.garlic.com/~lynn/2017c.html#60 [EXTERNAL] ComputerWorld Says: Cobol plays major role in U.S. government breaches http://www.garlic.com/~lynn/2017c.html#61 [EXTERNAL] ComputerWorld Says: Cobol plays major role in U.S. government breaches http://www.garlic.com/~lynn/2017c.html#69 ComputerWorld Says: Cobol plays major role in U.S. government breaches financial has had special dispensation for some (stronger) crypto ... and there was regular gov. representation at financial standards meetings. in the 90s, as gov. was loosing control of encryption ... for a time there was a gov. push for (allowing crypto but) official escrow of all (encyrption) keys ... I was rep to the key escrow meetings. I did make the case of differentiation between keys used for authentication and keys used for encruyption ... and that it is basic security violation for any but the individual have possession of their authentication keys. the gov. whined that people could cheat and use their authentication keys for encryption .... but that was about the last key escrow meeting. trivia: in the big 1jan1983 change over of arpanet to internetworking protocol ... there was approx. 100 IMP network nodes and 255 connected hosts ... at the time when the internal network was rapidly approaching 1000 nodes. This is old post with list of corporate locations that added one or more network nodes during 1983: http://www.garlic.com/~lynn/2006k.html#8 Arpa address there was especially difficult problems when links (between corporate nodes) cross national boundaries (and all internal links required encryption). ... past internal network posts http://www.garlic.com/~lynn/subnetwork.html#internalnet -- virtualization experience starting Jan1968, online at home since Mar1970 ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
