| Deutsch English Français Italiano |
|
<4113338481895805@66.250.146.128> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!nx01.iad01.newshosting.com!newshosting.com!post02.iad01!roadrunner.com!not-for-mail From: francois.grieu@spirtech.com Message-ID: <4113338481895805@66.250.146.128> Newsgroups: hannover.mhh.test,sci.crypt Subject: @@@@@ the horses, radios, and uses are all impressive and ethical @@@@@ Date: Fri, 20 Jul 2007 21:39:07 GMT Organization: until Basksh satisfys the bottles tightly, Faris won't resist any tight farms Lines: 41 X-Complaints-To: abuse@rr.com Bytes: 1866 's PGP use a password to unlock the cryptographic key. So, how do you back up the key without GAK? In other words, what do all companies do for this situation now? A situation that applies to all company data whether or not it is encrypted. A situation that has existed since the invention of the computer. Simple. You back it up. Make backups of the key. You can start by making your own key copy using off-site secure storage backup. Several authorized people can have a copy of the key, and they can each use their own password to get access to the key. The key is backed up not only by being on several different machines, it is also backed up in the off-line backups for these machines. After JUST ONE WEEK, you'll have 24 total copies of the key (3 + 3*7). After the first month: 214 copies. The government somehow thinks you'll clamor for THEM to backup your key by giving them a copy of the key, and if you lose all of yours... contact the Federal Secretary of Lost Keys. And for this great benefit, they want you to give them Key Recovery access to your cryptographic key. We know what Key Recovery means... By the way, the Government is restricting *communications* products, which use public key cryptography. BY DEFINITION the SENDER will NEVER expect to decrypt the traffic once