top of page
"I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access."
Key,
Standard
Customized
Exlpore more Key quotes

"What's happened is that an incessant, an insidious insurgency has repeatedly attacked the key infrastructure targets, reducing outputs."
Key,

"The moment I saw the model and heard about the complementing base pairs I realized that it was the key to understanding all the problems in biology we had found intractable - it was the birth of molecular biology."

"Well, Detroit Institute is kind of a key - probably the largest permanent collection of puppets in the US."
Key,
Explore more quotes by Dorothy Denning

"With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests."

"While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm."

"I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions."

"I think most organizations have an interest in key recovery, at least with respect to stored data."

"We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders."

"Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons."

"The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn't all that widespread, but that state of affairs is expected to change rapidly."

"I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access."
bottom of page