Refine Search

  •  
  •  
Encryption proponents brace for new threats in name of fighting terrorism

...restricting data-scrambling technology, encryption-rights advocates fear. Such a measure...the commission of a crime, something encryption advocates fear would achieve little...Why should the fact that you use encryption have anything to do with how guilty...

http://chronicle.augusta.com/stories/2003/03/31/tec_474819.shtml
XXX Technology
Terrorism attacks renew debate over encryption software

...debate is brewing over whether makers of encryption software should be obliged to provide...messages. Phil Zimmermann and fellow encryption supporters thought they had won the...permit the export of full-strength encryption software without requiring programmers...

http://chronicle.augusta.com/stories/2001/09/24/tec_322341.shtml
XXX Technology
Encryption programs no longer 'munition', but still restricted

The latest news on encryption is both good and bad. The good news is that encryption programs, as of Nov. 15, are no longer being...President Clinton's executive order shows that encryption programs targeted for shipment outside the United...

http://chronicle.augusta.com/stories/1996/12/09/tec_201112.shtml
XXX Technology
Clinton vs. encryption bill

...administration appeared to agree to computer encryption reform -- especially since over 250 House...parties were poised to pass a strong pro-encryption bill, H.R. 850. Encryption uses "keys," a series of numbers known only...

http://chronicle.augusta.com/stories/1999/12/12/edi_277505.shtml
Editorials
Encryption controls declared unconstitutional

...Forbidding the electronic export of computer encryption is a violation of free speech, a federal...S. software industry's plans for encryption, a security system that encodes e-mail...and criminals, the government treats encryption codes as if they were military weapons...

http://chronicle.augusta.com/stories/1997/08/27/tec_213671.shtml
XXX Technology
Encryption program offers security

...Associates' easy-to-use desktop encryption program should keep your documents secure...something called the 160-bit Blowfish encryption algorithm. Blowfish is well known for...unlocks your data, the more effective the encryption scheme. PCCrypto uses 10 to the 48th...

http://chronicle.augusta.com/stories/1996/12/31/tec_201939.shtml
XXX Technology
Encryption still tightly controlled

The latest news on encryption is both good and bad. The good news is that encryption programs, as of Nov. 15, are no longer being...President Clinton's executive order shows that encryption programs targeted for shipment outside the United...

http://chronicle.augusta.com/stories/1996/12/23/tec_201631.shtml
XXX Technology
Commerce Dept. sets new rules on export of encryption software

...in order to get permission to export encryption products. They also transfer export...Department to the Commerce Department. Encryption products are computer software and hardware...sued seeking greater freedom to export encryption products. "There's very little functional...

http://chronicle.augusta.com/stories/1996/12/31/tec_201940.shtml
XXX Technology
E-mail encryption is helpful

...having trouble using Pretty Good Privacy encryption. She knows of only four other PGP users...or recipient ever knowing. Without encryption, financial, medical and other sensitive...past week devoted several sessions to encryption and PGP, which marks its 10th anniversary...

http://chronicle.augusta.com/stories/2001/03/13/tec_307073.shtml
XXX Technology
FBI director to meet with high-tech leaders over encryption

...over the use of virtually unbreakable encryption to scramble e-mail against electronic...people can use practically unbreakable encryption in the United States without built-in...American public socially responsible encryption services and products." Sen. Dianne...

http://chronicle.augusta.com/stories/1998/06/02/tec_230052.shtml
XXX Technology