1. Companies use encryption codes to prevent outsiders from monitoring their confidential electronic communications. 2. Dependability is measured by the quality of encryption codes and backup generators and the infrequency of bugs and crashes. 3. Encryption codes protect everything from e-mail to sensitive legal, medical and financial Internet messages from potential eavesdroppers. 4. For his part, Junger insists encryption source code is a form of speech that communicates ideas. 5. Freeh wants the FBI to be able to access encryption codes for wire-tapping and other criminal investigations. 6. He never revealed the encryption code or the program he used to defeat it. 7. In that earlier case, Bernstein v. United States, Patel also considered whether encryption source code was protected by the First Amendment. 8. Microsoft will still charge its customers for the software that will be updated with the encryption codes. 9. One of the most contentious issues before Congress this year is export controls on the hard-to-break computer encryption codes. 10. Phil Zimmerman, inventor of the widely used Pretty Good Privacy encryption code, describes e-mail as being highly susceptible to exposure. |