Anonymous ID: b36858 Feb. 23, 2019, 2:20 a.m. No.5343408   🗄️.is 🔗kun

>>5341229 (OP)

Q post 2879

 

Some of these are older articles, but they show the background on how data can get into the wrong hands or be used in appropriately

 

I am not very knowledgeable on this stuff, but would these keys be stored at ICANN? Used by ICANN?

 

Hillary Clinton Controls 50,000 Encryption Keys (2018)

https://projectspeak.net/banktreason-6

 

Escrowed Encryption and Related Issues (1996)

Excerpt

“Most importantly, all executive branch workers are in principle responsible to a unitary source of authority (the President). Thus, concerns are raised that any corruption at the top levels of government might diffuse downward, as exemplified by past attempts by the Executive Office of the President to use the Internal Revenue Service to harass its political enemies”

 

https://www.nap.edu/read/5131/chapter/10#168 (a lot of really good detailed info – Clipper, LEAF, SkipJack)

 

“maybe the back door isn't the right door”

 

https://www.theverge.com/2015/12/19/10628208/hillary-clinton-back-door-debate

 

“In the 1990s, the Clinton Administration directed technology companies to store copies of their encryption keys with the government”

https://www.propublica.org/article/fact-checking-the-debate-on-encryption

 

Clipper & Escrow Keys

http://osaka.law.miami.edu/~froomkin/articles/clipper.htm

 

https://en.wikipedia.org/wiki/Clipper_chip