IETF OpenPGP (date)
October 31, 1997
- Re: IDEA licensing vs RSA licensing (Re: What do we have to do today?), Jon Callas, 16:55
- IDEA licensing vs RSA licensing (Re: What do we have to do today?), Adam Back, 16:40
- Re: What do we have to do today?, Jon Callas, 13:42
- non-US acceptance of RSA (Re: What do we have to do today?), Adam Back, 13:33
- Re: What do we have to do today?, Gene Hoffman, 12:39
- Re: What do we have to do today?, Uri Blumenthal, 11:15
- Re: What do we have to do today?, Bill Frantz, 10:33
- Re: CART before the HORSE, Uri Blumenthal, 09:48
- Re: CART before the HORSE, Markku-Juhani Saarinen, 07:43
- Re: CART before the HORSE, David P. Kemp, 06:45
- Re: the security case against CMR (Re: rough consensus), Adam Back, 03:21
October 30, 1997
- Re: What do we have to do today?, Peter Gutmann, 21:00
- How many 2.6 users?, Ian Grigg, 20:57
- Re: What do we have to do today?, Ian Grigg, 20:30
- Re: the security case against CMR (Re: rough consensus), Kent Crispin, 19:44
- OpenPGP WG meeting at 40th IETF in Washington DC, John W. Noerenberg, 19:17
- Re: expectation of privacy (Re: Symmetric Algorithm), Jon Callas, 19:08
- expectation of privacy (Re: Symmetric Algorithm), Adam Back, 18:28
- Re: do security recommendations belong in standard?, Rick Smith, 17:46
- Re: Looking for test LDAP PGP keyserver, Jonathan Wienke, 16:58
- Re: What do we have to do today?, Uri Blumenthal, 16:36
- Re: do security recommendations belong in standard?, Adam Back, 16:28
- Re: Symmetric Algorithm, A. Padgett Peterson P.E. Information Security, 15:54
- the security case against CMR (Re: rough consensus), Adam Back, 15:46
- Re: What do we have to do today?, Gene Hoffman, 15:06
- Re: CMR/ARR and OpenPGP (Re: What this WG is doing), Adam Back, 14:43
- Re: rough consensus, Ulf Möller, 14:36
- Re: What do we have to do today?, iang, 14:08
- CART before the HORSE, Ian Grigg, 13:52
- Re: What do we have to do today?, William H. Geiger III, 13:11
- Re: What do we have to do today?, Uri Blumenthal, 12:48
- Re: do security recommendations belong in standard?, Rick Smith, 12:18
- Re: CMR/ARR and OpenPGP (Re: What this WG is doing), Adam Back, 11:13
- do security recommendations belong in standard? (Re: CAN'T Re: MUST versus SHOULD in application decisions), Adam Back, 11:13
- Re: What this WG is doing, Lutz Donnerhacke, 10:43
- Re: rough consensus, Kent Crispin, 10:34
- Re: What this WG is doing, Bill Stewart, 10:31
- Re: Symmetric Algorithm, Lutz Donnerhacke, 10:02
- Re: Symmetric Algorithm, David Hayes, 09:18
- Re: Symmetric Algorithm, Ian Grigg, 08:12
- rough consensus, Ulf Möller, 08:11
- Re: Symmetric Algorithm, Lutz Donnerhacke, 07:52
- Re: Symmetric Algorithm, Peter Gutmann, 06:58
- Re: What this WG is doing, Bill Stewart, 06:37
- Re: Symmetric Algorithm, Ulf Möller, 06:12
- Re: CAN'T Re: MUST versus SHOULD in application decisions, Lutz Donnerhacke, 05:54
- Re: CMR/ARR and OpenPGP, Lutz Donnerhacke, 05:28
- CAN'T Re: MUST versus SHOULD in application decisions, Bill Stewart, 05:20
- Re: CMR/ARR and OpenPGP (Re: What this WG is doing), Bill Stewart, 04:25
- Re: Symmetric Algorithm, Bill Stewart, 04:25
- What do we have to do today?, Lutz Donnerhacke, 01:11
October 29, 1997
- Looking for test LDAP PGP keyserver, Peter Gutmann, 23:14
- Re: Symmetric Algorithm, Bill Frantz, 23:01
- Re: Symmetric Algorithm, Jon Callas, 16:24
- Re: Software implementig Hierarchical trust, Jon Callas, 15:55
- Re: Symmetric Algorithm, Black Unicorn, 12:08
- re: Symmetric Algorithm, A. Padgett Peterson P.E. Information Security, 11:13
- Re: Symmetric Algorithm, Uri Blumenthal, 10:30
- Re: Symmetric Algorithm, William H. Geiger III, 10:27
- Re: Symmetric Algorithm, Uri Blumenthal, 10:18
- Re: Software implementig Hierarchical trust, Lutz Donnerhacke, 09:20
- Software implementig Hierarchical trust, Salvatore Nesta, 08:33
- RE: Symmetric Algorithm, Sam Simpson, 07:56
- Re: Documentation of Alternatives (was Re: What this WG is doing), Lutz Donnerhacke, 07:40
- Re: What this WG is doing, Lutz Donnerhacke, 07:36
- Documentation of Alternatives (was Re: What this WG is doing), Ian Grigg, 07:26
- Re: Symmetric Algorithm, Assar Westerlund, 07:23
- Re: Symmetric Algorithm, WengFatt Fong, 06:40
- Re: What this WG is doing, Lindsay Mathieson, 06:32
- Re: What this WG is doing, Adam Back, 06:21
- CMR/ARR and OpenPGP (Re: What this WG is doing), Adam Back, 06:19
- Re: What this WG is doing, Lutz Donnerhacke, 06:04
- Re: What this WG is doing, Ian Grigg, 05:09
- Re: Symmetric Algorithm, Tony Mione, 04:33
- HTTP key lookup request and Host: (was: Re: key server lookup protocol?), Gerald Young, 03:30
- Re: What this WG is doing, John W. Noerenberg, 01:57
- Re: What this WG is doing, John W. Noerenberg, 01:54
- Re: CfV: Packet <-> Elements, John W. Noerenberg, 01:54
- Re: Symmetric Algorithm, Lutz Donnerhacke, 01:16
- Re: What this WG is doing, Bill Stewart, 01:15
- Re: What this WG is doing, Lutz Donnerhacke, 01:09
October 28, 1997
- Re: Symmetric Algorithm, Uri Blumenthal, 21:22
- Re: Symmetric Algorithm, Paul Hoffman / IMC, 19:34
- Symmetric Algorithm, Jon Callas, 19:03
- Re: What this WG is doing, Adam Back, 16:03
- Re: key server lookup protocol?, Pat Richard, 15:11
- Re: What this WG is doing, Ian Grigg, 08:01
- Re: What this WG is doing, Lutz Donnerhacke, 07:54
- Re: What this WG is doing, Rodney Thayer, 06:52
- Re: key server lookup protocol?, Frank Brueckner, 06:01
- Re: What this WG is doing, Lutz Donnerhacke, 01:59
October 27, 1997
- What this WG is doing, John W. Noerenberg, 18:37
- Re: KeyIDs and Key Fingerprints, stewarts, 14:48
- Re: GAK/CDR workarounds, David Hayes, 10:06
- Re: MUST versus SHOULD in application decisions, Lutz Donnerhacke, 09:27
- Re: MUST versus SHOULD in application decisions, William H. Geiger III, 09:23
- Re: MUST versus SHOULD in application decisions, Lutz Donnerhacke, 09:08
- Re: MUST versus SHOULD in application decisions, William H. Geiger III, 09:05
- Re: GAK/CDR workarounds, Lutz Donnerhacke, 08:38
- Re: MUST versus SHOULD in application decisions, Lutz Donnerhacke, 08:26
- Re: CfV: Packet <-> Elements, Lutz Donnerhacke, 08:12
- Re: Differing algortithms in chains, Lutz Donnerhacke, 08:09
- Re: GAK/CDR workarounds, Georg Josef Uphoff, 07:45
- GAK/CDR workarounds, Lindsay Mathieson, 01:44
October 24, 1997
- Re: draft editor(s), Adam Back, 15:23
- Differing algortithms in chains, Pat Richard, 14:03
- Re: draft editor(s), John W. Noerenberg, 11:55
- secret sharing (Re: CDR design document), Adam Back, 08:22
- Re: Armor versus MIME versus binary, Tom Phinney, 08:21
- Re: Armor versus MIME versus binary, Lutz Donnerhacke, 06:38
- Re: Armor versus MIME versus binary, William H. Geiger III, 01:48
- CfV: Packet <-> Elements, Lutz Donnerhacke, 01:31
- Re: Armor versus MIME versus binary, Lutz Donnerhacke, 01:20
October 23, 1997
- Re: draft editor(s), Lutz Donnerhacke, 10:08
- Re: What RSA & Netscape have to offer, Tim May, 09:51
- Re: ASN.1 packet?, Lutz Donnerhacke, 09:09
- Re: ASN.1 packet?, William Allen Simpson, 08:10
- Armor versus MIME versus binary, William Allen Simpson, 08:10
- draft editor(s), William Allen Simpson, 08:10
- Re: CDR design document, Jonathan Wienke, 07:43
- Re: World-wide GAK, Salvatore Nesta, 02:50
- What RSA & Netscape have to offer, William H. Geiger III, 01:13
October 22, 1997
- Re: World-wide GAK, Andrew Bromage, 19:45
- Re: World-wide GAK, Tim May, 15:06
- World-wide GAK, Jeffrey Gold, 14:28
- RE: CDR design document, A. Padgett Peterson P.E. Information Security, 06:49
- Re: New Draft... going forward, Lutz Donnerhacke, 02:21
- Re: New Draft... going forward, John W. Noerenberg, 02:12
- ASN.1 packet?, Lutz Donnerhacke, 00:54
October 21, 1997
- Re: KeyIDs and Key Fingerprints, Andrew Bromage, 22:02
- PGP 5.5 CMR key examples, mini-review, Greg Broiles, 18:00
- Re: updating status of keys in public key chain..?, William H. Geiger III, 17:41
- CDR design document, Adam Back, 14:52
- updating status of keys in public key chain..?, robert . guerra, 14:48
- Re: New Draft... going forward, Kent Crispin, 13:52
- RE: Is PGP still private?, Gaon, David, 12:49
- Re: New Draft... going forward, Lutz Donnerhacke, 11:37
- Re: New Draft... going forward, Gene Hoffman, 11:33
- Re: New Draft... going forward, Lutz Donnerhacke, 11:27
- Re: New Draft... going forward, Gene Hoffman, 11:23
- Re: New Draft... going forward, Lutz Donnerhacke, 11:03
- Changes to the current draft, Lutz Donnerhacke, 10:59
- Re: New Draft... going forward, Gene Hoffman, 10:14
- Re: New Draft... going forward, Gene Hoffman, 10:10
- Re: New Draft... going forward, Lutz Donnerhacke, 08:42
- Re: New Draft... going forward, Hal Finney, 07:27
- Re: New Draft... going forward, Ian Grigg, 04:44
- Re: New Draft... going forward, Ian Grigg, 04:27
- Re: KeyIDs and Key Fingerprints, Lutz Donnerhacke, 04:16
- Re: KeyIDs and Key Fingerprints, William H. Geiger III, 03:10
- Re: KeyIDs and Key Fingerprints, Lutz Donnerhacke, 01:28
- Re: New Draft... going forward, Lutz Donnerhacke, 01:13
- Re: New Draft... going forward, Lutz Donnerhacke, 01:06
- Re: New Draft... going forward, Lutz Donnerhacke, 00:27
October 20, 1997
- Re: New Draft... going forward, William H. Geiger III, 23:11
- Re: New Draft... going forward, Ian Grigg, 20:12
- Re: New Draft... going forward, Paul Hoffman / IMC, 19:14
- Re: encryption key expiry in pgp5.x, Hal Finney, 18:07
- Re: New Draft... going forward, William H. Geiger III, 18:04
- Re: encryption key expiry in pgp5.x, Adam Back, 17:11
- Re: New Draft... going forward, Paul Hoffman / IMC, 16:34
- Re: encryption key expiry in pgp5.x, Hal Finney, 15:13
- Re: New Draft... going forward, William H. Geiger III, 14:56
- Re: encryption key expiry in pgp5.x, Adam Back, 14:40
- Re: KeyIDs and Key Fingerprints, William H. Geiger III, 13:05
- [VOTE] comp.security.pgp.test, Joe_Tsai, 12:33
- RE: New Draft... going forward, Mike Wynn, 11:38
- Re: Revealing individual messages., Ian Miller, 11:15
- Re: New Draft... going forward, Michael Elkins, 10:56
- Re: New Draft... going forward, Lutz Donnerhacke, 06:10
- Re: KeyIDs and Key Fingerprints, Lutz Donnerhacke, 05:58
- Re: New Draft... going forward, Thomas Roessler, 02:44
- Re: New Draft... going forward, Lutz Donnerhacke, 00:32
- Re: MIME question about new draft, Lutz Donnerhacke, 00:29
- Re: Is PGP still private?, Kent Crispin, 00:06
October 19, 1997
- Re: why we are arguing for more resistant variants, Kent Crispin, 23:39
- Re: MIME question about new draft, Ben Escoto, 17:41
- Re: encryption key expiry in pgp5.x, Hal Finney, 16:53
- encryption key expiry in pgp5.x, Adam Back, 15:57
- Re: Revealing individual messages., Bill Stewart, 13:01
- Re: why we are arguing for more resistant variants (Re: Is PGP still private?), Adam Back, 12:01
- New Draft... going forward, Lutz Donnerhacke, 10:33
- Re: why we are arguing for more resistant variants (Re: Is PGP still private?), Kent Crispin, 10:03
- Re: Is PGP still private?, A. Padgett Peterson P.E. Information Security, 08:13
- Callas/Grigg CMR variant (was Re: what is purpose of CMR?), Adam Back, 04:06
- Revealing individual messages., Ian Miller, 04:03
- why we are arguing for more resistant variants (Re: Is PGP still private?), Adam Back, 02:21
October 18, 1997
- Re: Is PGP still private?, Toto, 14:56
- Re: Is PGP still private?, Andrew Bromage, 14:19
- Re: anti-GAK design principles: worked example #1, Adam Back, 14:15
- jurisdictional interactions (Re: Is PGP still private?), Adam Back, 14:15
- Re: Is PGP still private?, Kent Crispin, 09:23
- Re: what is purpose of CMR?, Ian Grigg, 06:00
- Re: Secure receipts, Ian Brown, 03:57
- PGP 5.0 Secret Key Formats, Lindsay Mathieson, 02:51
- Re: Is PGP still private?, Adam Back, 02:41
- Re: proposal: commercial data recovery, Adam Back, 02:41
- Re: what is purpose of CMR?, Adam Back, 02:41
- Re: proposal: commercial data recovery, Bill Stewart, 02:33
- Re: anti-GAK design principles: worked example #1, Bill Stewart, 01:46
October 17, 1997
- Re: what is purpose of CMR?, Anonymous, 19:36
- Re: proposal: commercial data recovery, Jon Callas, 17:17
- Re: Is PGP still private?, Jon Callas, 17:10
- Re: what is purpose of CMR?, Jon Callas, 16:57
- what is purpose of CMR?, Adam Back, 16:53
- binding cryptography, Adam Back, 16:52
- Re: Is PGP still private?, Adam Back, 16:26
- Re: proposal: commercial data recovery, nospam-seesignature, 15:59
- Re: Is PGP still private?, A. Padgett Peterson P.E. Information Security, 13:51
- Re: KeyIDs and Key Fingerprints, Adam Back, 11:50
- Re: Is PGP still private?, Adam Back, 11:50
- Re: anti-GAK design principles: worked example #1, Adam Back, 10:32
- Re: KeyIDs and Key Fingerprints, William H. Geiger III, 09:27
- Re: KeyIDs and Key Fingerprints, Will Price, 04:23
- Re: KeyIDs and Key Fingerprints, Will Price, 04:04
- Re: anti-GAK design principles: worked example #1, Bill Stewart, 01:49
- Re: KeyIDs and Key Fingerprints, Tom Phinney, 00:54
October 16, 1997
- Re: KeyIDs and Key Fingerprints, William H. Geiger III, 22:12
- Re: Secure receipts, David Formosa, 21:03
- KeyIDs and Key Fingerprints, Hal Finney, 18:09
- Re: Secure receipts, Paul Hoffman / IMC, 17:09
- Re: Secure receipts, Karen Rosenthal, 15:53
- Re: Is PGP still private?, William H. Geiger III, 15:44
- Re: Secure receipts, Andrew Bromage, 15:40
- Is PGP still private?, Roland Silver, 15:24
- Re: PGP Inc apology deal, Adam Back, 13:33
- Re: Secure receipts, Ian Brown, 13:01
- Re: Secure receipts, Bonatti Chris, 12:57
- Re: Secure receipts, Hal Finney, 12:49
- RE: Secure receipts, Mike Wynn, 12:40
- PGP Inc apology deal (Re: anti-GAK design principles: worked example #1), Adam Back, 11:23
- PGP Inc apology deal, Adam Back, 11:10
- PGP Inc apology deal (was Re: anti-GAK design principles: worked example #1), Adam Back, 11:00
- Re: Praise the Lord! / Re: anti-GAK design principles: worked example #1, Jon Callas, 10:44
- Secure receipts, Ian Brown, 08:58
- re. GAK resistant design principles: worked example #1, Adam Back, 06:41
- Praise the Lord! / Re: anti-GAK design principles: worked example #1, TruthMonger, 02:36
- Re: anti-GAK design principles: worked example #1, Adam Back, 00:21
- Re: PGP/MIME Partial compliance test, Ben Escoto, 00:06
October 15, 1997
- Re: PGP/MIME Partial compliance test, Anthony E. Greene, 23:34
- PGP/MIME test, addendum, Ben Escoto, 23:16
- Re: anti-GAK design principles: worked example #1, Kent Crispin, 20:32
- Re: anti-GAK design principles: worked example #1, Jon Callas, 19:04
- PGP/MIME Partial compliance test, Ben Escoto, 17:52
- Re: proposal: commercial data recovery, stewarts, 16:08
- Re: anti-GAK design principles: worked example #1, Gene Hoffman, 16:07
- anti-GAK design principles: worked example #1, Adam Back, 15:51
- Re: proposal: commercial data recovery, Richard Johnson, 15:32
- Re: proposal: commercial data recovery, Richard Johnson, 15:32
- RE: Time to move on, A. Padgett Peterson P.E. Information Security, 13:33
- Re: Just say "No" to key recovery concerns...keep OpenPGP pure, Tim May, 11:41
- Re: Just say "No" to key recovery concerns...keep OpenPGP pure, Rick Smith, 11:14
- Re: proposal: commercial data recovery, Rick Smith, 09:23
- RE: Time to move on, Gaon, David, 08:29
- RE: Schneier comment on CMR, Gaon, David, 08:04
- Time to move on, iang, 07:21
- Re: proposal: commercial data recovery, Ian Brown, 04:01
- Re: proposal: commercial data recovery, Will Price, 02:31
- RE: Schneier comment on CMR, Mike Wynn, 01:22
October 14, 1997
- Re: proposal: commercial data recovery [P], Marshall Clow, 22:00
- Cuz' Me...., Paul Rarey, 20:42
- Schneier comment on CMR, Adam Back, 20:31
- Re: the case for separate comms keys, Peter Gutmann, 19:33
- Re: proposal: commercial data recovery, Anonymous Remailer, 18:03
- Re: commercial data recovery, Andrew Bromage, 16:56
- Just say "No" to key recovery concerns...keep OpenPGP pure, Tim May, 15:44
- Re: proposal: commercial data recovery, Adam Back, 15:39
- Re: PGP CAKware & IETF controlled Open-PGP standard, Omegaman, 15:30
- Re: proposal: commercial data recovery [P], Anthony E. Greene, 15:14
- Re: proposal: commercial data recovery, Rick Smith, 13:40
- Re: [VOTE] comp.security.pgp.test, ? the Platypus {aka David Formosa}, 13:34
- Re: proposal: commercial data recovery, Adam Back, 12:45
- [no subject], robert . guerra, 12:43
- Re: proposal: commercial data recovery, Adam Back, 11:14
- [VOTE] comp.security.pgp.test, Dave Del Torto, 11:13
- Re: Discussion, Adam Back, 09:48
- Re: proposal: commercial data recovery, Hal Finney, 09:40
- Re: proposal: commercial data recovery, Bill Frantz, 09:08
- Re: commercial data recovery, Adam Back, 07:30
- Re: Discussion, Tim Philp, 06:26
- Re: commercial data recovery, alexlh, 05:10
- commercial data recovery, Zooko Journeyman, 03:50
- proposal: commercial data recovery, Adam Back, 02:39
- Re: Politics & PGP, Hironobu Suzuki, 02:39
- Re: Discussion, Ian Brown, 02:19
- Re: Discussion, Anthony E. Greene, 01:48
October 13, 1997
- Re: PGP Implemention, Lindsay Mathieson, 23:31
- Re: PGP Implemention, Lindsay Mathieson, 23:31
- Re: PGP Implemention, iang, 18:34
- Re: PGP Implemention, William Allen Simpson, 16:16
- PGP Implemention, Lindsay Mathieson, 13:55
- Politics & PGP, Jeffrey Gold, 10:22
- Re: PGP CAKware & IETF controlled Open-PGP standard, Ian Brown, 08:13
- RE: PGP CAKware & IETF controlled Open-PGP standard, A. Padgett Peterson P.E. Information Security, 07:32
- Re: IETF policy on refusing to allow politics to weaken protocols (Re: Why Adam Back keeps politicizing technical issues), Tony Mione, 07:00
- Re: IETF policy on refusing to allow politics to weaken protocols (Re: Why Adam Back keeps politicizing technical issues), Adam Back, 05:45
- Re: Discussion, Ian Brown, 02:12
- Re: Discussion, Ian Brown, 01:51
October 12, 1997
- Re: Discussion, Will Price, 23:53
- Re: IETF policy on refusing to allow politics to weaken protocols (Re: Why Adam Back keeps politicizing technical issues), Bill Frantz, 23:46
- Re: PGP CAKware & IETF controlled Open-PGP standard, iang, 19:40
- Re: PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 18:17
- Re: negative security aspects of GAK compliance, Adam Back, 18:17
- Re: PGP CAKware & IETF controlled Open-PGP standard, Jonathan Seybold, 13:23
- Re: PolicyMaker & GAK compliance, William H. Geiger III, 10:48
- Re: PolicyMaker & GAK compliance, Ian Brown, 09:34
- Re: negative security aspects of GAK compliance, Hal Finney, 09:21
- Re: PolicyMaker & GAK compliance, Ian Brown, 09:16
- Re: PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 06:44
- Re: the case for separate comms keys, Adam Back, 05:59
- Re: negative security aspects of GAK compliance, Adam Back, 05:59
- Re: PGP CAKware & IETF controlled Open-PGP standard, Ian Miller, 04:32
- Re: Signature assertions, Adam Back, 03:48
- Re: the case for separate comms keys, Ryan Anderson, 03:30
- negative security aspects of GAK compliance, Adam Back, 02:45
October 11, 1997
- Signature assertions, Andrew Bromage, 17:08
- the case for separate comms keys, Adam Back, 16:11
- new "communication key" semantics & PFS, Adam Back, 14:20
- PolicyMaker & GAK compliance, Adam Back, 14:20
- key use sub-packets / draft EEMA standards, Adam Back, 12:17
- Re: PGP CAKware & IETF controlled Open-PGP standard, Hal Finney, 11:52
- Re: PGP CAKware & IETF controlled Open-PGP standard, Hal Finney, 11:07
- Re: PGP CAKware & IETF controlled Open-PGP standard, Ian Brown, 07:36
- Re: r.e. OpenPGP document status, Adam Back, 06:37
- Re: PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 04:44
- Re: PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 04:44
- Re: PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 03:16
- IETF policy on refusing to allow politics to weaken protocols (Re: Why Adam Back keeps politicizing technical issues), Adam Back, 03:16
- Re: PGP CAKware & IETF controlled Open-PGP standard, Ian Brown, 02:45
- r.e. OpenPGP document status, Rodney Thayer, 02:35
October 10, 1997
- Re: PGP CAKware & IETF controlled Open-PGP standard, William H. Geiger III, 22:54
- Re: PGP CAKware & IETF controlled Open-PGP standard, William H. Geiger III, 22:14
- Re: Why Adam Back keeps politicizing technical issues (Re: Why Jon Callas keeps picking nits), William H. Geiger III, 21:28
- Re: PGP CAKware & IETF controlled Open-PGP standard, William Allen Simpson, 20:53
- Why Jon Callas keeps picking nits (Re: Why Corporate Message Recovery isn't Key Escrow), Adam Back, 19:48
- Why corporate message recovery IS gak compliant (Re: Why Corporate Message Recovery isn't GAK), Adam Back, 18:54
- Re: PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 18:54
- Re: PGP CAKware & IETF controlled Open-PGP standard, Andrew Bromage, 18:24
- Re: Key Escrow Issues, William H. Geiger III, 17:49
- Re: PGP CAKware & IETF controlled Open-PGP standard, Hal Finney, 17:06
- Why Corporate Message Recovery isn't GAK, Jon Callas, 15:15
- Why Corporate Message Recovery isn't Key Escrow, Jon Callas, 14:58
- Re: PGP CAKware & IETF controlled Open-PGP standard, Jon Callas, 14:53
- PGP CAKware & IETF controlled Open-PGP standard, Adam Back, 14:26
- Re: Key Escrow Issues, Ian Brown, 01:54
- Re: Key Escrow Issues, Lutz Donnerhacke, 00:47
October 02, 1997
- Key quorum, Andrew Bromage, 14:54
- Re: Principles and Principals, David P. Kemp, 12:09
- Re: Principles and Principals, David P. Kemp, 09:40
- Re: Principles and Principals, Bonatti Chris, 06:40
- Re: Principles and Principals, Ian Brown, 02:49