Talk:Key escrow
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||
|
This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later. |
Missing
[edit]There seems to be no discussion of the opposing viewpoint - the reasons behind requiring key escrow etc (Gwinkless 10:12, 9 May 2007 (UTC))
Social vs Technical
[edit]This article seems to have been written with a basis in data security owing to its content (ie "national security") not its function. Key escrow is simply a concept whereby a trusted third party is given decryption keys and there is a situation where these keys are released. This is used in some email system for example. The encryption of data does not imply the value of its contents, nor should this article imply such User A1 04:47, 25 July 2007 (UTC)
In any implementation of encryption there is the implicit implication that there is 'value' in the unencrypted data. Value here is pretty much meaningless without a context - but it is important to note it is always implied even if it is not present. Pre-haps you mean guarantee rather than imply? 88.104.18.39 (talk) 14:35, 31 July 2010 (UTC)
I am missing the socio-ethical dimension here a little. The "mistrust against the system" seems to be, even if one sentence may be read otherwise, just be based on the escrow agent, not the privileged party being potentially able to abuse its power... 80.138.2.127 (talk) 00:15, 19 May 2013 (UTC)
Thus far, no key escrow system has been designed which meets both objections and nearly all have failed to meet even one.
[edit]this needs to be cited — Preceding unsigned comment added by 178.202.102.170 (talk) 21:25, 4 April 2013 (UTC)
- Thus far, not teapot has been found orbiting Sun between Earth and Mars.
- You don't need a citation on non-existence.
- --Jwilkes (talk) 11:53, 19 March 2024 (UTC)
See Also DSI?
[edit]There's a See Also link to Data Securities International, and looking at the article, it seems to provide source code escrow, which isn't key escrow. No mention is made of them providing key escrow, so that should be elaborated on, or removed. EnticingCanine (talk) 14:30, 20 October 2020 (UTC)
- Start-Class Cryptography articles
- Mid-importance Cryptography articles
- Start-Class Computer science articles
- Mid-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- Start-Class Computing articles
- Mid-importance Computing articles
- Start-Class software articles
- Mid-importance software articles
- Start-Class software articles of Mid-importance
- All Software articles
- Start-Class Computer Security articles
- High-importance Computer Security articles
- Start-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- Start-Class Mass surveillance articles
- High-importance Mass surveillance articles