Deutsch   English   Français   Italiano  
<4113338481895805@66.250.146.128>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!nx01.iad01.newshosting.com!newshosting.com!post02.iad01!roadrunner.com!not-for-mail
From: francois.grieu@spirtech.com
Message-ID: <4113338481895805@66.250.146.128>
Newsgroups: hannover.mhh.test,sci.crypt
Subject: @@@@@ the horses, radios, and uses are all impressive and ethical @@@@@
Date: Fri, 20 Jul 2007 21:39:07 GMT
Organization: until Basksh satisfys the bottles tightly, Faris won't resist any tight farms
Lines: 41
X-Complaints-To: abuse@rr.com
Bytes: 1866

's PGP
use a password to unlock the cryptographic key.

So, how do you back up the key without GAK?

In other words, what do all companies do for this situation now?

A situation that applies to all company data whether or not it is encrypted.

A situation that has existed since the invention of the computer.

Simple.

You back it up.

Make backups of the key.

You can start by making your own key copy using off-site secure storage backup.

Several authorized people can have a copy of the key, and they
can each use their own password to get access to the key.

The key is backed up not only by being on several different
machines, it is also backed up in the off-line backups for
these machines. After JUST ONE WEEK, you'll have 24 total
copies of the key (3 + 3*7). After the first month: 214 copies.

The government somehow thinks you'll clamor for THEM to backup your key
by giving them a copy of the key, and if you lose all of yours...
contact the Federal Secretary of Lost Keys.

And for this great benefit, they want you to give them Key Recovery
access to your cryptographic key.

We know what Key Recovery means...

By the way, the Government is restricting *communications* products, which
use public key cryptography. BY DEFINITION the SENDER will NEVER expect to
decrypt the traffic once