Civil rights activists say, `sniff this!'

Caruso, Denise
May 1996
Macworld;May96, Vol. 13 Issue 5, p244
Opinion. Argues that the Telecommunications Reform Act of 1996 makes the most sweeping attack on free speech in United States history. Suggestion that digital encryption is one solution to Internet censorship; Encryption technology called PGP (Pretty Good Privacy); Concern of government security specialists about widespread use of encryption.


Related Articles

  • CHINA'S BIG FIREWALL. Coonan, Clifford // Daily Variety;8/17/2006, Vol. 292 Issue 32, p7 

    The article reports on the establishment of a firewall to block Internet broadcasts of online films that mock officially approved culture in China. According to the Beijing News, the State Administration for Radio, Film and Television is drafting rules to render Internet broadcasts about films,...

  • Internet Fraud. Garceau, Linda R. // Ohio CPA Journal;Jul-Sep2000, Vol. 59 Issue 3, p50 

    Deals with the threat posed by Internet fraud to the business-to-consumer (B2C) industry. Predicted Internet B2C sales by 2004; Information on the basics of data encryption; Limitations of private key encryption; Public key or asymmetric key encryption systems employed in the encryption process.

  • Cryptographic science vs. the virtual forces of evil. Duchemin, John // American Banker;4/15/1996 Supplement, Vol. 161, p10A 

    Presents information on the use of data encryption for security purposes on the Internet. Findings of a study done by several computer scientists and mathematicians; Advantages of encryption; What team of encryption scientists saw as an improvement; Comments from Fred J. Rica, data security...

  • Securing information on the Internet.  // Supervisory Management;Sep95, Vol. 40 Issue 9, p3 

    Focuses on cryptographic technology for effective encryption of information on the Internet. Digital signing of a communication or the use of secret keys; Symmetric key cryptography or a secret number or key for two communicating parties; Public keys that serve as the user's identification...

  • Aong others, big brother will be watching web tv. Horvitz, Leslie Alan // Insight on the News;01/06/97, Vol. 13 Issue 1, p38 

    Looks at the controversy over encryption technologies for Web TV, an electronic box that converts a television into an Internet terminal. Importance of tight encryption to secure transactions on Web TV; Export controls concerning this key technology.

  • End-to-end Internet security still depends on encryption apps. Jones, Chris // InfoWorld;04/07/97, Vol. 19 Issue 14, p41 

    Focuses on security issues concerning the Internet computer network. Feature of public-key encryption-based applications; Communication with a branch office or business partners; Use of firewalls as a first line of defense.

  • ANSWER LINE. SPECTOR, LINCOLN // PCWorld;Jan2013, Vol. 31 Issue 1, p89 

    The article presents an answer as to the best method of sending private information safely over the Internet, including the use of compressed data encryption which would require the recipient having the encryption password, or the use of the cloud-based service Sendinc.com.

  • Booher set to challenge U.S. crypto law. Rodger, Will // Inter@ctive Week;08/24/98, Vol. 5 Issue 32, p10 

    States that Silicon Valley programmer Charles T. Booher challenged the United States regulation on encryption technology. Indication that Booher posted data scrambling software on August 19, 1998 on the Internet computer network; Charges Booher could face if the case goes to trial; Comments...

  • Be a cryptomaniac on the Internet and help set long-overdue standards. Metcalfe, Bob // InfoWorld;6/24/96, Vol. 18 Issue 26, p56 

    Focuses on encryption issues related to the Internet computer network. Federal regulation of encryption technologies; Promotion of Commerce On-Line in the Digital Era Act of 1996; Cryptographic products on the Internet.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics